Mar 17 18:51:15.057037 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Mar 17 18:51:15.057056 kernel: Linux version 5.15.179-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Mar 17 17:11:44 -00 2025 Mar 17 18:51:15.057064 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Mar 17 18:51:15.057071 kernel: printk: bootconsole [pl11] enabled Mar 17 18:51:15.057075 kernel: efi: EFI v2.70 by EDK II Mar 17 18:51:15.057081 kernel: efi: ACPI 2.0=0x3fd5f018 SMBIOS=0x3e580000 SMBIOS 3.0=0x3e560000 MEMATTR=0x3f214018 RNG=0x3fd5f998 MEMRESERVE=0x3763cf98 Mar 17 18:51:15.057087 kernel: random: crng init done Mar 17 18:51:15.057093 kernel: ACPI: Early table checksum verification disabled Mar 17 18:51:15.057098 kernel: ACPI: RSDP 0x000000003FD5F018 000024 (v02 VRTUAL) Mar 17 18:51:15.057104 kernel: ACPI: XSDT 0x000000003FD5FF18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Mar 17 18:51:15.057109 kernel: ACPI: FACP 0x000000003FD5FC18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Mar 17 18:51:15.057114 kernel: ACPI: DSDT 0x000000003FD41018 01DFCD (v02 MSFTVM DSDT01 00000001 INTL 20230628) Mar 17 18:51:15.057121 kernel: ACPI: DBG2 0x000000003FD5FB18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Mar 17 18:51:15.057127 kernel: ACPI: GTDT 0x000000003FD5FD98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Mar 17 18:51:15.057133 kernel: ACPI: OEM0 0x000000003FD5F098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Mar 17 18:51:15.057139 kernel: ACPI: SPCR 0x000000003FD5FA98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Mar 17 18:51:15.057145 kernel: ACPI: APIC 0x000000003FD5F818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Mar 17 18:51:15.057152 kernel: ACPI: SRAT 0x000000003FD5F198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Mar 17 18:51:15.057157 kernel: ACPI: PPTT 0x000000003FD5F418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Mar 17 18:51:15.057163 kernel: ACPI: BGRT 0x000000003FD5FE98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Mar 17 18:51:15.057169 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Mar 17 18:51:15.057174 kernel: NUMA: Failed to initialise from firmware Mar 17 18:51:15.057180 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Mar 17 18:51:15.057186 kernel: NUMA: NODE_DATA [mem 0x1bf7f3900-0x1bf7f8fff] Mar 17 18:51:15.057191 kernel: Zone ranges: Mar 17 18:51:15.057197 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Mar 17 18:51:15.057203 kernel: DMA32 empty Mar 17 18:51:15.057208 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Mar 17 18:51:15.057215 kernel: Movable zone start for each node Mar 17 18:51:15.057221 kernel: Early memory node ranges Mar 17 18:51:15.057226 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Mar 17 18:51:15.057232 kernel: node 0: [mem 0x0000000000824000-0x000000003e54ffff] Mar 17 18:51:15.057238 kernel: node 0: [mem 0x000000003e550000-0x000000003e87ffff] Mar 17 18:51:15.057243 kernel: node 0: [mem 0x000000003e880000-0x000000003fc7ffff] Mar 17 18:51:15.057249 kernel: node 0: [mem 0x000000003fc80000-0x000000003fcfffff] Mar 17 18:51:15.057254 kernel: node 0: [mem 0x000000003fd00000-0x000000003fffffff] Mar 17 18:51:15.057260 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Mar 17 18:51:15.057266 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Mar 17 18:51:15.057271 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Mar 17 18:51:15.057277 kernel: psci: probing for conduit method from ACPI. Mar 17 18:51:15.057287 kernel: psci: PSCIv1.1 detected in firmware. Mar 17 18:51:15.057293 kernel: psci: Using standard PSCI v0.2 function IDs Mar 17 18:51:15.057299 kernel: psci: MIGRATE_INFO_TYPE not supported. Mar 17 18:51:15.057305 kernel: psci: SMC Calling Convention v1.4 Mar 17 18:51:15.057311 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Mar 17 18:51:15.057318 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Mar 17 18:51:15.057324 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Mar 17 18:51:15.057330 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Mar 17 18:51:15.057336 kernel: pcpu-alloc: [0] 0 [0] 1 Mar 17 18:51:15.057342 kernel: Detected PIPT I-cache on CPU0 Mar 17 18:51:15.057348 kernel: CPU features: detected: GIC system register CPU interface Mar 17 18:51:15.057354 kernel: CPU features: detected: Hardware dirty bit management Mar 17 18:51:15.057360 kernel: CPU features: detected: Spectre-BHB Mar 17 18:51:15.057366 kernel: CPU features: kernel page table isolation forced ON by KASLR Mar 17 18:51:15.057372 kernel: CPU features: detected: Kernel page table isolation (KPTI) Mar 17 18:51:15.057378 kernel: CPU features: detected: ARM erratum 1418040 Mar 17 18:51:15.057385 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Mar 17 18:51:15.057391 kernel: CPU features: detected: SSBS not fully self-synchronizing Mar 17 18:51:15.057398 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Mar 17 18:51:15.057404 kernel: Policy zone: Normal Mar 17 18:51:15.057411 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=e034db32d58fe7496a3db6ba3879dd9052cea2cf1597d65edfc7b26afc92530d Mar 17 18:51:15.057418 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Mar 17 18:51:15.057424 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Mar 17 18:51:15.057430 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Mar 17 18:51:15.057436 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Mar 17 18:51:15.057443 kernel: software IO TLB: mapped [mem 0x000000003a550000-0x000000003e550000] (64MB) Mar 17 18:51:15.057449 kernel: Memory: 3986944K/4194160K available (9792K kernel code, 2094K rwdata, 7584K rodata, 36416K init, 777K bss, 207216K reserved, 0K cma-reserved) Mar 17 18:51:15.057456 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Mar 17 18:51:15.057462 kernel: trace event string verifier disabled Mar 17 18:51:15.057469 kernel: rcu: Preemptible hierarchical RCU implementation. Mar 17 18:51:15.057475 kernel: rcu: RCU event tracing is enabled. Mar 17 18:51:15.057481 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Mar 17 18:51:15.057488 kernel: Trampoline variant of Tasks RCU enabled. Mar 17 18:51:15.057494 kernel: Tracing variant of Tasks RCU enabled. Mar 17 18:51:15.057500 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Mar 17 18:51:15.057506 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Mar 17 18:51:15.057512 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Mar 17 18:51:15.057518 kernel: GICv3: 960 SPIs implemented Mar 17 18:51:15.062664 kernel: GICv3: 0 Extended SPIs implemented Mar 17 18:51:15.062671 kernel: GICv3: Distributor has no Range Selector support Mar 17 18:51:15.062678 kernel: Root IRQ handler: gic_handle_irq Mar 17 18:51:15.062684 kernel: GICv3: 16 PPIs implemented Mar 17 18:51:15.062691 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Mar 17 18:51:15.062697 kernel: ITS: No ITS available, not enabling LPIs Mar 17 18:51:15.062704 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Mar 17 18:51:15.062711 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Mar 17 18:51:15.062717 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Mar 17 18:51:15.062724 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Mar 17 18:51:15.062730 kernel: Console: colour dummy device 80x25 Mar 17 18:51:15.062738 kernel: printk: console [tty1] enabled Mar 17 18:51:15.062745 kernel: ACPI: Core revision 20210730 Mar 17 18:51:15.062752 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Mar 17 18:51:15.062758 kernel: pid_max: default: 32768 minimum: 301 Mar 17 18:51:15.062765 kernel: LSM: Security Framework initializing Mar 17 18:51:15.062771 kernel: SELinux: Initializing. Mar 17 18:51:15.062777 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Mar 17 18:51:15.062784 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Mar 17 18:51:15.062790 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Mar 17 18:51:15.062798 kernel: Hyper-V: Host Build 10.0.22477.1619-1-0 Mar 17 18:51:15.062804 kernel: rcu: Hierarchical SRCU implementation. Mar 17 18:51:15.062811 kernel: Remapping and enabling EFI services. Mar 17 18:51:15.062817 kernel: smp: Bringing up secondary CPUs ... Mar 17 18:51:15.062823 kernel: Detected PIPT I-cache on CPU1 Mar 17 18:51:15.062830 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Mar 17 18:51:15.062836 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Mar 17 18:51:15.062843 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Mar 17 18:51:15.062849 kernel: smp: Brought up 1 node, 2 CPUs Mar 17 18:51:15.062856 kernel: SMP: Total of 2 processors activated. Mar 17 18:51:15.062863 kernel: CPU features: detected: 32-bit EL0 Support Mar 17 18:51:15.062870 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Mar 17 18:51:15.062876 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Mar 17 18:51:15.062883 kernel: CPU features: detected: CRC32 instructions Mar 17 18:51:15.062889 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Mar 17 18:51:15.062895 kernel: CPU features: detected: LSE atomic instructions Mar 17 18:51:15.062902 kernel: CPU features: detected: Privileged Access Never Mar 17 18:51:15.062908 kernel: CPU: All CPU(s) started at EL1 Mar 17 18:51:15.062914 kernel: alternatives: patching kernel code Mar 17 18:51:15.062922 kernel: devtmpfs: initialized Mar 17 18:51:15.062933 kernel: KASLR enabled Mar 17 18:51:15.062940 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Mar 17 18:51:15.062948 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Mar 17 18:51:15.062955 kernel: pinctrl core: initialized pinctrl subsystem Mar 17 18:51:15.062962 kernel: SMBIOS 3.1.0 present. Mar 17 18:51:15.062969 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 09/28/2024 Mar 17 18:51:15.062976 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Mar 17 18:51:15.062983 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Mar 17 18:51:15.062991 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Mar 17 18:51:15.062998 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Mar 17 18:51:15.063005 kernel: audit: initializing netlink subsys (disabled) Mar 17 18:51:15.063011 kernel: audit: type=2000 audit(0.090:1): state=initialized audit_enabled=0 res=1 Mar 17 18:51:15.063018 kernel: thermal_sys: Registered thermal governor 'step_wise' Mar 17 18:51:15.063025 kernel: cpuidle: using governor menu Mar 17 18:51:15.063032 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Mar 17 18:51:15.063040 kernel: ASID allocator initialised with 32768 entries Mar 17 18:51:15.063047 kernel: ACPI: bus type PCI registered Mar 17 18:51:15.063054 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Mar 17 18:51:15.063060 kernel: Serial: AMBA PL011 UART driver Mar 17 18:51:15.063067 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Mar 17 18:51:15.063074 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Mar 17 18:51:15.063080 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Mar 17 18:51:15.063087 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Mar 17 18:51:15.063093 kernel: cryptd: max_cpu_qlen set to 1000 Mar 17 18:51:15.063101 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Mar 17 18:51:15.063108 kernel: ACPI: Added _OSI(Module Device) Mar 17 18:51:15.063115 kernel: ACPI: Added _OSI(Processor Device) Mar 17 18:51:15.063122 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Mar 17 18:51:15.063129 kernel: ACPI: Added _OSI(Processor Aggregator Device) Mar 17 18:51:15.063135 kernel: ACPI: Added _OSI(Linux-Dell-Video) Mar 17 18:51:15.063142 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Mar 17 18:51:15.063149 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Mar 17 18:51:15.063156 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Mar 17 18:51:15.063164 kernel: ACPI: Interpreter enabled Mar 17 18:51:15.063171 kernel: ACPI: Using GIC for interrupt routing Mar 17 18:51:15.063178 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Mar 17 18:51:15.063185 kernel: printk: console [ttyAMA0] enabled Mar 17 18:51:15.063191 kernel: printk: bootconsole [pl11] disabled Mar 17 18:51:15.063198 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Mar 17 18:51:15.063205 kernel: iommu: Default domain type: Translated Mar 17 18:51:15.063211 kernel: iommu: DMA domain TLB invalidation policy: strict mode Mar 17 18:51:15.063218 kernel: vgaarb: loaded Mar 17 18:51:15.063224 kernel: pps_core: LinuxPPS API ver. 1 registered Mar 17 18:51:15.063233 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Mar 17 18:51:15.063239 kernel: PTP clock support registered Mar 17 18:51:15.063246 kernel: Registered efivars operations Mar 17 18:51:15.063252 kernel: No ACPI PMU IRQ for CPU0 Mar 17 18:51:15.063259 kernel: No ACPI PMU IRQ for CPU1 Mar 17 18:51:15.063265 kernel: clocksource: Switched to clocksource arch_sys_counter Mar 17 18:51:15.063273 kernel: VFS: Disk quotas dquot_6.6.0 Mar 17 18:51:15.063279 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Mar 17 18:51:15.063288 kernel: pnp: PnP ACPI init Mar 17 18:51:15.063295 kernel: pnp: PnP ACPI: found 0 devices Mar 17 18:51:15.063301 kernel: NET: Registered PF_INET protocol family Mar 17 18:51:15.063308 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Mar 17 18:51:15.063315 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Mar 17 18:51:15.063322 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Mar 17 18:51:15.063329 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Mar 17 18:51:15.063336 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Mar 17 18:51:15.063343 kernel: TCP: Hash tables configured (established 32768 bind 32768) Mar 17 18:51:15.063351 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Mar 17 18:51:15.063358 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Mar 17 18:51:15.063365 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Mar 17 18:51:15.063372 kernel: PCI: CLS 0 bytes, default 64 Mar 17 18:51:15.063378 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Mar 17 18:51:15.063385 kernel: kvm [1]: HYP mode not available Mar 17 18:51:15.063392 kernel: Initialise system trusted keyrings Mar 17 18:51:15.063398 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Mar 17 18:51:15.063405 kernel: Key type asymmetric registered Mar 17 18:51:15.063413 kernel: Asymmetric key parser 'x509' registered Mar 17 18:51:15.063420 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Mar 17 18:51:15.063426 kernel: io scheduler mq-deadline registered Mar 17 18:51:15.063433 kernel: io scheduler kyber registered Mar 17 18:51:15.063440 kernel: io scheduler bfq registered Mar 17 18:51:15.063446 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Mar 17 18:51:15.063453 kernel: thunder_xcv, ver 1.0 Mar 17 18:51:15.063460 kernel: thunder_bgx, ver 1.0 Mar 17 18:51:15.063466 kernel: nicpf, ver 1.0 Mar 17 18:51:15.063473 kernel: nicvf, ver 1.0 Mar 17 18:51:15.063651 kernel: rtc-efi rtc-efi.0: registered as rtc0 Mar 17 18:51:15.063717 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-03-17T18:51:14 UTC (1742237474) Mar 17 18:51:15.063727 kernel: efifb: probing for efifb Mar 17 18:51:15.063734 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Mar 17 18:51:15.063741 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Mar 17 18:51:15.063748 kernel: efifb: scrolling: redraw Mar 17 18:51:15.063755 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Mar 17 18:51:15.063764 kernel: Console: switching to colour frame buffer device 128x48 Mar 17 18:51:15.063771 kernel: fb0: EFI VGA frame buffer device Mar 17 18:51:15.063778 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Mar 17 18:51:15.063785 kernel: hid: raw HID events driver (C) Jiri Kosina Mar 17 18:51:15.063792 kernel: NET: Registered PF_INET6 protocol family Mar 17 18:51:15.063798 kernel: Segment Routing with IPv6 Mar 17 18:51:15.063805 kernel: In-situ OAM (IOAM) with IPv6 Mar 17 18:51:15.063812 kernel: NET: Registered PF_PACKET protocol family Mar 17 18:51:15.063819 kernel: Key type dns_resolver registered Mar 17 18:51:15.063826 kernel: registered taskstats version 1 Mar 17 18:51:15.063834 kernel: Loading compiled-in X.509 certificates Mar 17 18:51:15.063841 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.179-flatcar: c6f3fb83dc6bb7052b07ec5b1ef41d12f9b3f7e4' Mar 17 18:51:15.063847 kernel: Key type .fscrypt registered Mar 17 18:51:15.063854 kernel: Key type fscrypt-provisioning registered Mar 17 18:51:15.063861 kernel: ima: No TPM chip found, activating TPM-bypass! Mar 17 18:51:15.063867 kernel: ima: Allocated hash algorithm: sha1 Mar 17 18:51:15.063874 kernel: ima: No architecture policies found Mar 17 18:51:15.063881 kernel: clk: Disabling unused clocks Mar 17 18:51:15.063889 kernel: Freeing unused kernel memory: 36416K Mar 17 18:51:15.063895 kernel: Run /init as init process Mar 17 18:51:15.063902 kernel: with arguments: Mar 17 18:51:15.063909 kernel: /init Mar 17 18:51:15.063916 kernel: with environment: Mar 17 18:51:15.063922 kernel: HOME=/ Mar 17 18:51:15.063928 kernel: TERM=linux Mar 17 18:51:15.063935 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Mar 17 18:51:15.063945 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Mar 17 18:51:15.063955 systemd[1]: Detected virtualization microsoft. Mar 17 18:51:15.063962 systemd[1]: Detected architecture arm64. Mar 17 18:51:15.063969 systemd[1]: Running in initrd. Mar 17 18:51:15.063976 systemd[1]: No hostname configured, using default hostname. Mar 17 18:51:15.063983 systemd[1]: Hostname set to . Mar 17 18:51:15.063990 systemd[1]: Initializing machine ID from random generator. Mar 17 18:51:15.063997 systemd[1]: Queued start job for default target initrd.target. Mar 17 18:51:15.064006 systemd[1]: Started systemd-ask-password-console.path. Mar 17 18:51:15.064013 systemd[1]: Reached target cryptsetup.target. Mar 17 18:51:15.064020 systemd[1]: Reached target paths.target. Mar 17 18:51:15.064027 systemd[1]: Reached target slices.target. Mar 17 18:51:15.064034 systemd[1]: Reached target swap.target. Mar 17 18:51:15.064041 systemd[1]: Reached target timers.target. Mar 17 18:51:15.064049 systemd[1]: Listening on iscsid.socket. Mar 17 18:51:15.064056 systemd[1]: Listening on iscsiuio.socket. Mar 17 18:51:15.064064 systemd[1]: Listening on systemd-journald-audit.socket. Mar 17 18:51:15.064071 systemd[1]: Listening on systemd-journald-dev-log.socket. Mar 17 18:51:15.064078 systemd[1]: Listening on systemd-journald.socket. Mar 17 18:51:15.064085 systemd[1]: Listening on systemd-networkd.socket. Mar 17 18:51:15.064093 systemd[1]: Listening on systemd-udevd-control.socket. Mar 17 18:51:15.064100 systemd[1]: Listening on systemd-udevd-kernel.socket. Mar 17 18:51:15.064107 systemd[1]: Reached target sockets.target. Mar 17 18:51:15.064114 systemd[1]: Starting kmod-static-nodes.service... Mar 17 18:51:15.064122 systemd[1]: Finished network-cleanup.service. Mar 17 18:51:15.064130 systemd[1]: Starting systemd-fsck-usr.service... Mar 17 18:51:15.064137 systemd[1]: Starting systemd-journald.service... Mar 17 18:51:15.064144 systemd[1]: Starting systemd-modules-load.service... Mar 17 18:51:15.064151 systemd[1]: Starting systemd-resolved.service... Mar 17 18:51:15.064158 systemd[1]: Starting systemd-vconsole-setup.service... Mar 17 18:51:15.064170 systemd-journald[276]: Journal started Mar 17 18:51:15.064213 systemd-journald[276]: Runtime Journal (/run/log/journal/39cfeaf0082f4e20bdaef6f9959c6a74) is 8.0M, max 78.5M, 70.5M free. Mar 17 18:51:15.043431 systemd-modules-load[277]: Inserted module 'overlay' Mar 17 18:51:15.086235 systemd-resolved[278]: Positive Trust Anchors: Mar 17 18:51:15.109809 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Mar 17 18:51:15.109831 systemd[1]: Started systemd-journald.service. Mar 17 18:51:15.086249 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Mar 17 18:51:15.086277 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Mar 17 18:51:15.228962 kernel: Bridge firewalling registered Mar 17 18:51:15.228985 kernel: audit: type=1130 audit(1742237475.164:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:15.229001 kernel: SCSI subsystem initialized Mar 17 18:51:15.229018 kernel: audit: type=1130 audit(1742237475.188:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:15.229035 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Mar 17 18:51:15.229052 kernel: device-mapper: uevent: version 1.0.3 Mar 17 18:51:15.229072 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Mar 17 18:51:15.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:15.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:15.088401 systemd-resolved[278]: Defaulting to hostname 'linux'. Mar 17 18:51:15.256057 kernel: audit: type=1130 audit(1742237475.232:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:15.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:15.126495 systemd-modules-load[277]: Inserted module 'br_netfilter' Mar 17 18:51:15.180776 systemd[1]: Started systemd-resolved.service. Mar 17 18:51:15.299242 kernel: audit: type=1130 audit(1742237475.255:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:15.299274 kernel: audit: type=1130 audit(1742237475.283:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:15.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:15.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:15.204696 systemd[1]: Finished kmod-static-nodes.service. Mar 17 18:51:15.325904 kernel: audit: type=1130 audit(1742237475.305:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:15.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:15.231595 systemd-modules-load[277]: Inserted module 'dm_multipath' Mar 17 18:51:15.232881 systemd[1]: Finished systemd-fsck-usr.service. Mar 17 18:51:15.256473 systemd[1]: Finished systemd-modules-load.service. Mar 17 18:51:15.283927 systemd[1]: Finished systemd-vconsole-setup.service. Mar 17 18:51:15.305942 systemd[1]: Reached target nss-lookup.target. Mar 17 18:51:15.335466 systemd[1]: Starting dracut-cmdline-ask.service... Mar 17 18:51:15.346135 systemd[1]: Starting systemd-sysctl.service... Mar 17 18:51:15.364447 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Mar 17 18:51:15.412645 kernel: audit: type=1130 audit(1742237475.392:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:15.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:15.376765 systemd[1]: Finished systemd-sysctl.service. Mar 17 18:51:15.442791 kernel: audit: type=1130 audit(1742237475.417:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:15.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:15.393298 systemd[1]: Finished dracut-cmdline-ask.service. Mar 17 18:51:15.417475 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Mar 17 18:51:15.475124 kernel: audit: type=1130 audit(1742237475.442:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:15.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:15.443982 systemd[1]: Starting dracut-cmdline.service... Mar 17 18:51:15.479824 dracut-cmdline[298]: dracut-dracut-053 Mar 17 18:51:15.479824 dracut-cmdline[298]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=t Mar 17 18:51:15.479824 dracut-cmdline[298]: tyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=e034db32d58fe7496a3db6ba3879dd9052cea2cf1597d65edfc7b26afc92530d Mar 17 18:51:15.539539 kernel: Loading iSCSI transport class v2.0-870. Mar 17 18:51:15.555545 kernel: iscsi: registered transport (tcp) Mar 17 18:51:15.576745 kernel: iscsi: registered transport (qla4xxx) Mar 17 18:51:15.576809 kernel: QLogic iSCSI HBA Driver Mar 17 18:51:15.607563 systemd[1]: Finished dracut-cmdline.service. Mar 17 18:51:15.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:15.618613 systemd[1]: Starting dracut-pre-udev.service... Mar 17 18:51:15.669542 kernel: raid6: neonx8 gen() 13804 MB/s Mar 17 18:51:15.689542 kernel: raid6: neonx8 xor() 10823 MB/s Mar 17 18:51:15.709540 kernel: raid6: neonx4 gen() 13562 MB/s Mar 17 18:51:15.730534 kernel: raid6: neonx4 xor() 11235 MB/s Mar 17 18:51:15.750532 kernel: raid6: neonx2 gen() 13045 MB/s Mar 17 18:51:15.770531 kernel: raid6: neonx2 xor() 10359 MB/s Mar 17 18:51:15.791531 kernel: raid6: neonx1 gen() 10517 MB/s Mar 17 18:51:15.811535 kernel: raid6: neonx1 xor() 8786 MB/s Mar 17 18:51:15.831531 kernel: raid6: int64x8 gen() 6273 MB/s Mar 17 18:51:15.852537 kernel: raid6: int64x8 xor() 3541 MB/s Mar 17 18:51:15.872536 kernel: raid6: int64x4 gen() 7227 MB/s Mar 17 18:51:15.892536 kernel: raid6: int64x4 xor() 3859 MB/s Mar 17 18:51:15.914550 kernel: raid6: int64x2 gen() 6146 MB/s Mar 17 18:51:15.934536 kernel: raid6: int64x2 xor() 3323 MB/s Mar 17 18:51:15.954535 kernel: raid6: int64x1 gen() 5046 MB/s Mar 17 18:51:15.979813 kernel: raid6: int64x1 xor() 2645 MB/s Mar 17 18:51:15.979824 kernel: raid6: using algorithm neonx8 gen() 13804 MB/s Mar 17 18:51:15.979832 kernel: raid6: .... xor() 10823 MB/s, rmw enabled Mar 17 18:51:15.983907 kernel: raid6: using neon recovery algorithm Mar 17 18:51:16.004434 kernel: xor: measuring software checksum speed Mar 17 18:51:16.004455 kernel: 8regs : 17242 MB/sec Mar 17 18:51:16.008539 kernel: 32regs : 19712 MB/sec Mar 17 18:51:16.017035 kernel: arm64_neon : 26014 MB/sec Mar 17 18:51:16.017051 kernel: xor: using function: arm64_neon (26014 MB/sec) Mar 17 18:51:16.074544 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Mar 17 18:51:16.085441 systemd[1]: Finished dracut-pre-udev.service. Mar 17 18:51:16.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:16.094000 audit: BPF prog-id=7 op=LOAD Mar 17 18:51:16.094000 audit: BPF prog-id=8 op=LOAD Mar 17 18:51:16.094924 systemd[1]: Starting systemd-udevd.service... Mar 17 18:51:16.113446 systemd-udevd[475]: Using default interface naming scheme 'v252'. Mar 17 18:51:16.121257 systemd[1]: Started systemd-udevd.service. Mar 17 18:51:16.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:16.132176 systemd[1]: Starting dracut-pre-trigger.service... Mar 17 18:51:16.147255 dracut-pre-trigger[496]: rd.md=0: removing MD RAID activation Mar 17 18:51:16.178159 systemd[1]: Finished dracut-pre-trigger.service. Mar 17 18:51:16.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:16.184107 systemd[1]: Starting systemd-udev-trigger.service... Mar 17 18:51:16.219050 systemd[1]: Finished systemd-udev-trigger.service. Mar 17 18:51:16.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:16.275535 kernel: hv_vmbus: Vmbus version:5.3 Mar 17 18:51:16.289255 kernel: hv_vmbus: registering driver hyperv_keyboard Mar 17 18:51:16.289304 kernel: hv_vmbus: registering driver hid_hyperv Mar 17 18:51:16.289315 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/MSFT1000:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Mar 17 18:51:16.320779 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Mar 17 18:51:16.320834 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Mar 17 18:51:16.326654 kernel: hv_vmbus: registering driver hv_storvsc Mar 17 18:51:16.331543 kernel: hv_vmbus: registering driver hv_netvsc Mar 17 18:51:16.338543 kernel: scsi host1: storvsc_host_t Mar 17 18:51:16.338720 kernel: scsi host0: storvsc_host_t Mar 17 18:51:16.346586 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Mar 17 18:51:16.353336 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Mar 17 18:51:16.375753 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Mar 17 18:51:16.386866 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Mar 17 18:51:16.386886 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Mar 17 18:51:16.407605 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Mar 17 18:51:16.407761 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Mar 17 18:51:16.407848 kernel: sd 0:0:0:0: [sda] Write Protect is off Mar 17 18:51:16.407925 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Mar 17 18:51:16.408008 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Mar 17 18:51:16.408085 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Mar 17 18:51:16.408095 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Mar 17 18:51:16.436555 kernel: hv_netvsc 002248b8-bfb2-0022-48b8-bfb2002248b8 eth0: VF slot 1 added Mar 17 18:51:16.455244 kernel: hv_vmbus: registering driver hv_pci Mar 17 18:51:16.455295 kernel: hv_pci 5455a275-192a-4935-9409-42e9f9aa8785: PCI VMBus probing: Using version 0x10004 Mar 17 18:51:16.554207 kernel: hv_pci 5455a275-192a-4935-9409-42e9f9aa8785: PCI host bridge to bus 192a:00 Mar 17 18:51:16.554307 kernel: pci_bus 192a:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Mar 17 18:51:16.554396 kernel: pci_bus 192a:00: No busn resource found for root bus, will use [bus 00-ff] Mar 17 18:51:16.554468 kernel: pci 192a:00:02.0: [15b3:1018] type 00 class 0x020000 Mar 17 18:51:16.554590 kernel: pci 192a:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Mar 17 18:51:16.554683 kernel: pci 192a:00:02.0: enabling Extended Tags Mar 17 18:51:16.554778 kernel: pci 192a:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 192a:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Mar 17 18:51:16.554855 kernel: pci_bus 192a:00: busn_res: [bus 00-ff] end is updated to 00 Mar 17 18:51:16.554932 kernel: pci 192a:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Mar 17 18:51:16.592543 kernel: mlx5_core 192a:00:02.0: firmware version: 16.30.1284 Mar 17 18:51:16.819839 kernel: mlx5_core 192a:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Mar 17 18:51:16.819958 kernel: hv_netvsc 002248b8-bfb2-0022-48b8-bfb2002248b8 eth0: VF registering: eth1 Mar 17 18:51:16.820040 kernel: mlx5_core 192a:00:02.0 eth1: joined to eth0 Mar 17 18:51:16.767944 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Mar 17 18:51:16.831545 kernel: mlx5_core 192a:00:02.0 enP6442s1: renamed from eth1 Mar 17 18:51:16.844552 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (538) Mar 17 18:51:16.858577 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Mar 17 18:51:16.952001 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Mar 17 18:51:16.981320 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Mar 17 18:51:16.987391 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Mar 17 18:51:16.999300 systemd[1]: Starting disk-uuid.service... Mar 17 18:51:18.030387 disk-uuid[601]: The operation has completed successfully. Mar 17 18:51:18.035416 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Mar 17 18:51:18.092634 systemd[1]: disk-uuid.service: Deactivated successfully. Mar 17 18:51:18.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:18.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:18.092744 systemd[1]: Finished disk-uuid.service. Mar 17 18:51:18.102154 systemd[1]: Starting verity-setup.service... Mar 17 18:51:18.142711 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Mar 17 18:51:18.374353 systemd[1]: Found device dev-mapper-usr.device. Mar 17 18:51:18.382801 systemd[1]: Finished verity-setup.service. Mar 17 18:51:18.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:18.389428 systemd[1]: Mounting sysusr-usr.mount... Mar 17 18:51:18.451554 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Mar 17 18:51:18.451426 systemd[1]: Mounted sysusr-usr.mount. Mar 17 18:51:18.455678 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Mar 17 18:51:18.456485 systemd[1]: Starting ignition-setup.service... Mar 17 18:51:18.472267 systemd[1]: Starting parse-ip-for-networkd.service... Mar 17 18:51:18.506179 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Mar 17 18:51:18.506203 kernel: BTRFS info (device sda6): using free space tree Mar 17 18:51:18.506214 kernel: BTRFS info (device sda6): has skinny extents Mar 17 18:51:18.566621 systemd[1]: Finished parse-ip-for-networkd.service. Mar 17 18:51:18.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:18.575000 audit: BPF prog-id=9 op=LOAD Mar 17 18:51:18.576410 systemd[1]: Starting systemd-networkd.service... Mar 17 18:51:18.590420 systemd[1]: mnt-oem.mount: Deactivated successfully. Mar 17 18:51:18.602912 systemd-networkd[871]: lo: Link UP Mar 17 18:51:18.602923 systemd-networkd[871]: lo: Gained carrier Mar 17 18:51:18.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:18.603699 systemd-networkd[871]: Enumeration completed Mar 17 18:51:18.606352 systemd[1]: Started systemd-networkd.service. Mar 17 18:51:18.607058 systemd-networkd[871]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Mar 17 18:51:18.611256 systemd[1]: Reached target network.target. Mar 17 18:51:18.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:18.623287 systemd[1]: Starting iscsiuio.service... Mar 17 18:51:18.650833 iscsid[880]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Mar 17 18:51:18.650833 iscsid[880]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Mar 17 18:51:18.650833 iscsid[880]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Mar 17 18:51:18.650833 iscsid[880]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Mar 17 18:51:18.650833 iscsid[880]: If using hardware iscsi like qla4xxx this message can be ignored. Mar 17 18:51:18.650833 iscsid[880]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Mar 17 18:51:18.650833 iscsid[880]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Mar 17 18:51:18.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:18.631828 systemd[1]: Started iscsiuio.service. Mar 17 18:51:18.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:18.646426 systemd[1]: Starting iscsid.service... Mar 17 18:51:18.661951 systemd[1]: Started iscsid.service. Mar 17 18:51:18.699792 systemd[1]: Starting dracut-initqueue.service... Mar 17 18:51:18.729388 systemd[1]: Finished dracut-initqueue.service. Mar 17 18:51:18.740704 systemd[1]: Reached target remote-fs-pre.target. Mar 17 18:51:18.746146 systemd[1]: Reached target remote-cryptsetup.target. Mar 17 18:51:18.754848 systemd[1]: Reached target remote-fs.target. Mar 17 18:51:18.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:18.766131 systemd[1]: Starting dracut-pre-mount.service... Mar 17 18:51:18.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:18.776210 systemd[1]: Finished ignition-setup.service. Mar 17 18:51:18.795313 systemd[1]: Finished dracut-pre-mount.service. Mar 17 18:51:18.807879 systemd[1]: Starting ignition-fetch-offline.service... Mar 17 18:51:18.840535 kernel: mlx5_core 192a:00:02.0 enP6442s1: Link up Mar 17 18:51:18.885536 kernel: hv_netvsc 002248b8-bfb2-0022-48b8-bfb2002248b8 eth0: Data path switched to VF: enP6442s1 Mar 17 18:51:18.892547 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 18:51:18.892892 systemd-networkd[871]: enP6442s1: Link UP Mar 17 18:51:18.895731 systemd-networkd[871]: eth0: Link UP Mar 17 18:51:18.895887 systemd-networkd[871]: eth0: Gained carrier Mar 17 18:51:18.905766 systemd-networkd[871]: enP6442s1: Gained carrier Mar 17 18:51:18.912642 systemd-networkd[871]: eth0: DHCPv4 address 10.200.20.21/24, gateway 10.200.20.1 acquired from 168.63.129.16 Mar 17 18:51:20.202697 systemd-networkd[871]: eth0: Gained IPv6LL Mar 17 18:51:21.221041 ignition[895]: Ignition 2.14.0 Mar 17 18:51:21.221054 ignition[895]: Stage: fetch-offline Mar 17 18:51:21.221121 ignition[895]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:51:21.221144 ignition[895]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Mar 17 18:51:21.319009 ignition[895]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Mar 17 18:51:21.319170 ignition[895]: parsed url from cmdline: "" Mar 17 18:51:21.319174 ignition[895]: no config URL provided Mar 17 18:51:21.319179 ignition[895]: reading system config file "/usr/lib/ignition/user.ign" Mar 17 18:51:21.364569 kernel: kauditd_printk_skb: 18 callbacks suppressed Mar 17 18:51:21.364598 kernel: audit: type=1130 audit(1742237481.334:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:21.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:21.328894 systemd[1]: Finished ignition-fetch-offline.service. Mar 17 18:51:21.319187 ignition[895]: no config at "/usr/lib/ignition/user.ign" Mar 17 18:51:21.335679 systemd[1]: Starting ignition-fetch.service... Mar 17 18:51:21.319192 ignition[895]: failed to fetch config: resource requires networking Mar 17 18:51:21.319568 ignition[895]: Ignition finished successfully Mar 17 18:51:21.368586 ignition[901]: Ignition 2.14.0 Mar 17 18:51:21.368593 ignition[901]: Stage: fetch Mar 17 18:51:21.368707 ignition[901]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:51:21.368725 ignition[901]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Mar 17 18:51:21.381423 ignition[901]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Mar 17 18:51:21.381584 ignition[901]: parsed url from cmdline: "" Mar 17 18:51:21.381588 ignition[901]: no config URL provided Mar 17 18:51:21.381593 ignition[901]: reading system config file "/usr/lib/ignition/user.ign" Mar 17 18:51:21.381600 ignition[901]: no config at "/usr/lib/ignition/user.ign" Mar 17 18:51:21.381633 ignition[901]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Mar 17 18:51:21.486997 ignition[901]: GET result: OK Mar 17 18:51:21.487074 ignition[901]: config has been read from IMDS userdata Mar 17 18:51:21.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:21.489576 unknown[901]: fetched base config from "system" Mar 17 18:51:21.528128 kernel: audit: type=1130 audit(1742237481.495:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:21.487093 ignition[901]: parsing config with SHA512: 9be2fc693c65ef1b20a0b99c93224bff694508502232199adcc00ed14d3966900b86a4516ac2917a6428a670d5505c4c61fa9d4699da900ccdbd81be00f66732 Mar 17 18:51:21.489584 unknown[901]: fetched base config from "system" Mar 17 18:51:21.489985 ignition[901]: fetch: fetch complete Mar 17 18:51:21.489589 unknown[901]: fetched user config from "azure" Mar 17 18:51:21.489991 ignition[901]: fetch: fetch passed Mar 17 18:51:21.568200 kernel: audit: type=1130 audit(1742237481.546:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:21.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:21.491374 systemd[1]: Finished ignition-fetch.service. Mar 17 18:51:21.490055 ignition[901]: Ignition finished successfully Mar 17 18:51:21.517159 systemd[1]: Starting ignition-kargs.service... Mar 17 18:51:21.529080 ignition[907]: Ignition 2.14.0 Mar 17 18:51:21.607902 kernel: audit: type=1130 audit(1742237481.580:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:21.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:21.537841 systemd[1]: Finished ignition-kargs.service. Mar 17 18:51:21.529087 ignition[907]: Stage: kargs Mar 17 18:51:21.547348 systemd[1]: Starting ignition-disks.service... Mar 17 18:51:21.529238 ignition[907]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:51:21.576631 systemd[1]: Finished ignition-disks.service. Mar 17 18:51:21.529263 ignition[907]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Mar 17 18:51:21.581266 systemd[1]: Reached target initrd-root-device.target. Mar 17 18:51:21.534140 ignition[907]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Mar 17 18:51:21.607755 systemd[1]: Reached target local-fs-pre.target. Mar 17 18:51:21.535467 ignition[907]: kargs: kargs passed Mar 17 18:51:21.612308 systemd[1]: Reached target local-fs.target. Mar 17 18:51:21.535553 ignition[907]: Ignition finished successfully Mar 17 18:51:21.620748 systemd[1]: Reached target sysinit.target. Mar 17 18:51:21.556783 ignition[913]: Ignition 2.14.0 Mar 17 18:51:21.627762 systemd[1]: Reached target basic.target. Mar 17 18:51:21.556790 ignition[913]: Stage: disks Mar 17 18:51:21.642108 systemd[1]: Starting systemd-fsck-root.service... Mar 17 18:51:21.556907 ignition[913]: reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:51:21.556927 ignition[913]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Mar 17 18:51:21.559768 ignition[913]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Mar 17 18:51:21.569855 ignition[913]: disks: disks passed Mar 17 18:51:21.569920 ignition[913]: Ignition finished successfully Mar 17 18:51:21.726554 systemd-fsck[921]: ROOT: clean, 623/7326000 files, 481077/7359488 blocks Mar 17 18:51:21.733078 systemd[1]: Finished systemd-fsck-root.service. Mar 17 18:51:21.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:21.760244 systemd[1]: Mounting sysroot.mount... Mar 17 18:51:21.768263 kernel: audit: type=1130 audit(1742237481.737:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:21.783545 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Mar 17 18:51:21.783847 systemd[1]: Mounted sysroot.mount. Mar 17 18:51:21.787862 systemd[1]: Reached target initrd-root-fs.target. Mar 17 18:51:21.822869 systemd[1]: Mounting sysroot-usr.mount... Mar 17 18:51:21.828085 systemd[1]: Starting flatcar-metadata-hostname.service... Mar 17 18:51:21.836888 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Mar 17 18:51:21.836929 systemd[1]: Reached target ignition-diskful.target. Mar 17 18:51:21.844759 systemd[1]: Mounted sysroot-usr.mount. Mar 17 18:51:21.898613 systemd[1]: Mounting sysroot-usr-share-oem.mount... Mar 17 18:51:21.905033 systemd[1]: Starting initrd-setup-root.service... Mar 17 18:51:21.932663 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (931) Mar 17 18:51:21.936408 initrd-setup-root[936]: cut: /sysroot/etc/passwd: No such file or directory Mar 17 18:51:21.951624 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Mar 17 18:51:21.951657 kernel: BTRFS info (device sda6): using free space tree Mar 17 18:51:21.956490 kernel: BTRFS info (device sda6): has skinny extents Mar 17 18:51:21.960231 systemd[1]: Mounted sysroot-usr-share-oem.mount. Mar 17 18:51:21.972135 initrd-setup-root[962]: cut: /sysroot/etc/group: No such file or directory Mar 17 18:51:21.998005 initrd-setup-root[970]: cut: /sysroot/etc/shadow: No such file or directory Mar 17 18:51:22.007254 initrd-setup-root[978]: cut: /sysroot/etc/gshadow: No such file or directory Mar 17 18:51:22.407353 systemd[1]: Finished initrd-setup-root.service. Mar 17 18:51:22.434872 kernel: audit: type=1130 audit(1742237482.412:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:22.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:22.413636 systemd[1]: Starting ignition-mount.service... Mar 17 18:51:22.438147 systemd[1]: Starting sysroot-boot.service... Mar 17 18:51:22.451847 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Mar 17 18:51:22.452806 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Mar 17 18:51:22.468108 ignition[998]: INFO : Ignition 2.14.0 Mar 17 18:51:22.468108 ignition[998]: INFO : Stage: mount Mar 17 18:51:22.477605 ignition[998]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:51:22.477605 ignition[998]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Mar 17 18:51:22.499616 ignition[998]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Mar 17 18:51:22.499616 ignition[998]: INFO : mount: mount passed Mar 17 18:51:22.499616 ignition[998]: INFO : Ignition finished successfully Mar 17 18:51:22.553969 kernel: audit: type=1130 audit(1742237482.502:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:22.553994 kernel: audit: type=1130 audit(1742237482.528:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:22.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:22.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:22.497832 systemd[1]: Finished ignition-mount.service. Mar 17 18:51:22.504272 systemd[1]: Finished sysroot-boot.service. Mar 17 18:51:22.927168 coreos-metadata[930]: Mar 17 18:51:22.927 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Mar 17 18:51:22.935441 coreos-metadata[930]: Mar 17 18:51:22.935 INFO Fetch successful Mar 17 18:51:22.963486 coreos-metadata[930]: Mar 17 18:51:22.963 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Mar 17 18:51:22.985152 coreos-metadata[930]: Mar 17 18:51:22.985 INFO Fetch successful Mar 17 18:51:22.999380 coreos-metadata[930]: Mar 17 18:51:22.999 INFO wrote hostname ci-3510.3.7-a-78f2e87fa3 to /sysroot/etc/hostname Mar 17 18:51:23.008143 systemd[1]: Finished flatcar-metadata-hostname.service. Mar 17 18:51:23.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:23.033815 systemd[1]: Starting ignition-files.service... Mar 17 18:51:23.043256 kernel: audit: type=1130 audit(1742237483.012:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:23.043469 systemd[1]: Mounting sysroot-usr-share-oem.mount... Mar 17 18:51:23.061543 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (1009) Mar 17 18:51:23.073213 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Mar 17 18:51:23.073255 kernel: BTRFS info (device sda6): using free space tree Mar 17 18:51:23.077940 kernel: BTRFS info (device sda6): has skinny extents Mar 17 18:51:23.087752 systemd[1]: Mounted sysroot-usr-share-oem.mount. Mar 17 18:51:23.102204 ignition[1028]: INFO : Ignition 2.14.0 Mar 17 18:51:23.102204 ignition[1028]: INFO : Stage: files Mar 17 18:51:23.113499 ignition[1028]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:51:23.113499 ignition[1028]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Mar 17 18:51:23.113499 ignition[1028]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Mar 17 18:51:23.113499 ignition[1028]: DEBUG : files: compiled without relabeling support, skipping Mar 17 18:51:23.113499 ignition[1028]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Mar 17 18:51:23.113499 ignition[1028]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Mar 17 18:51:23.176099 ignition[1028]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Mar 17 18:51:23.183928 ignition[1028]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Mar 17 18:51:23.191679 ignition[1028]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Mar 17 18:51:23.191094 unknown[1028]: wrote ssh authorized keys file for user: core Mar 17 18:51:23.205550 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/home/core/install.sh" Mar 17 18:51:23.205550 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/home/core/install.sh" Mar 17 18:51:23.205550 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/etc/flatcar/update.conf" Mar 17 18:51:23.205550 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/etc/flatcar/update.conf" Mar 17 18:51:23.205550 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" Mar 17 18:51:23.205550 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" Mar 17 18:51:23.205550 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Mar 17 18:51:23.205550 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(6): oem config not found in "/usr/share/oem", looking on oem partition Mar 17 18:51:23.294699 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(7): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3939418665" Mar 17 18:51:23.294699 ignition[1028]: CRITICAL : files: createFilesystemsFiles: createFiles: op(6): op(7): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3939418665": device or resource busy Mar 17 18:51:23.294699 ignition[1028]: ERROR : files: createFilesystemsFiles: createFiles: op(6): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3939418665", trying btrfs: device or resource busy Mar 17 18:51:23.294699 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3939418665" Mar 17 18:51:23.294699 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(8): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3939418665" Mar 17 18:51:23.294699 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [started] unmounting "/mnt/oem3939418665" Mar 17 18:51:23.294699 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(6): op(9): [finished] unmounting "/mnt/oem3939418665" Mar 17 18:51:23.294699 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Mar 17 18:51:23.294699 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Mar 17 18:51:23.294699 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Mar 17 18:51:23.294699 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3308495607" Mar 17 18:51:23.294699 ignition[1028]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3308495607": device or resource busy Mar 17 18:51:23.294699 ignition[1028]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3308495607", trying btrfs: device or resource busy Mar 17 18:51:23.294699 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3308495607" Mar 17 18:51:23.238986 systemd[1]: mnt-oem3939418665.mount: Deactivated successfully. Mar 17 18:51:23.471431 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3308495607" Mar 17 18:51:23.471431 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem3308495607" Mar 17 18:51:23.471431 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem3308495607" Mar 17 18:51:23.471431 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Mar 17 18:51:23.471431 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" Mar 17 18:51:23.471431 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-arm64.raw: attempt #1 Mar 17 18:51:23.781295 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Mar 17 18:51:24.002441 ignition[1028]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" Mar 17 18:51:24.002441 ignition[1028]: INFO : files: op(f): [started] processing unit "waagent.service" Mar 17 18:51:24.002441 ignition[1028]: INFO : files: op(f): [finished] processing unit "waagent.service" Mar 17 18:51:24.002441 ignition[1028]: INFO : files: op(10): [started] processing unit "nvidia.service" Mar 17 18:51:24.076947 kernel: audit: type=1130 audit(1742237484.027:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.017331 systemd[1]: Finished ignition-files.service. Mar 17 18:51:24.087761 ignition[1028]: INFO : files: op(10): [finished] processing unit "nvidia.service" Mar 17 18:51:24.087761 ignition[1028]: INFO : files: op(11): [started] setting preset to enabled for "waagent.service" Mar 17 18:51:24.087761 ignition[1028]: INFO : files: op(11): [finished] setting preset to enabled for "waagent.service" Mar 17 18:51:24.087761 ignition[1028]: INFO : files: op(12): [started] setting preset to enabled for "nvidia.service" Mar 17 18:51:24.087761 ignition[1028]: INFO : files: op(12): [finished] setting preset to enabled for "nvidia.service" Mar 17 18:51:24.087761 ignition[1028]: INFO : files: createResultFile: createFiles: op(13): [started] writing file "/sysroot/etc/.ignition-result.json" Mar 17 18:51:24.087761 ignition[1028]: INFO : files: createResultFile: createFiles: op(13): [finished] writing file "/sysroot/etc/.ignition-result.json" Mar 17 18:51:24.087761 ignition[1028]: INFO : files: files passed Mar 17 18:51:24.087761 ignition[1028]: INFO : Ignition finished successfully Mar 17 18:51:24.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.091000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.030370 systemd[1]: Starting initrd-setup-root-after-ignition.service... Mar 17 18:51:24.197807 initrd-setup-root-after-ignition[1053]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Mar 17 18:51:24.059471 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Mar 17 18:51:24.060480 systemd[1]: Starting ignition-quench.service... Mar 17 18:51:24.081564 systemd[1]: ignition-quench.service: Deactivated successfully. Mar 17 18:51:24.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.081674 systemd[1]: Finished ignition-quench.service. Mar 17 18:51:24.091983 systemd[1]: Finished initrd-setup-root-after-ignition.service. Mar 17 18:51:24.103533 systemd[1]: Reached target ignition-complete.target. Mar 17 18:51:24.123580 systemd[1]: Starting initrd-parse-etc.service... Mar 17 18:51:24.147666 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Mar 17 18:51:24.147791 systemd[1]: Finished initrd-parse-etc.service. Mar 17 18:51:24.159086 systemd[1]: Reached target initrd-fs.target. Mar 17 18:51:24.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.172658 systemd[1]: Reached target initrd.target. Mar 17 18:51:24.179962 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Mar 17 18:51:24.180859 systemd[1]: Starting dracut-pre-pivot.service... Mar 17 18:51:24.240063 systemd[1]: Finished dracut-pre-pivot.service. Mar 17 18:51:24.245787 systemd[1]: Starting initrd-cleanup.service... Mar 17 18:51:24.267419 systemd[1]: Stopped target nss-lookup.target. Mar 17 18:51:24.274400 systemd[1]: Stopped target remote-cryptsetup.target. Mar 17 18:51:24.284088 systemd[1]: Stopped target timers.target. Mar 17 18:51:24.293616 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Mar 17 18:51:24.293683 systemd[1]: Stopped dracut-pre-pivot.service. Mar 17 18:51:24.301967 systemd[1]: Stopped target initrd.target. Mar 17 18:51:24.309679 systemd[1]: Stopped target basic.target. Mar 17 18:51:24.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.318830 systemd[1]: Stopped target ignition-complete.target. Mar 17 18:51:24.332093 systemd[1]: Stopped target ignition-diskful.target. Mar 17 18:51:24.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.341233 systemd[1]: Stopped target initrd-root-device.target. Mar 17 18:51:24.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.350516 systemd[1]: Stopped target remote-fs.target. Mar 17 18:51:24.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.359636 systemd[1]: Stopped target remote-fs-pre.target. Mar 17 18:51:24.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.369425 systemd[1]: Stopped target sysinit.target. Mar 17 18:51:24.378763 systemd[1]: Stopped target local-fs.target. Mar 17 18:51:24.483202 iscsid[880]: iscsid shutting down. Mar 17 18:51:24.387346 systemd[1]: Stopped target local-fs-pre.target. Mar 17 18:51:24.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.498820 ignition[1066]: INFO : Ignition 2.14.0 Mar 17 18:51:24.498820 ignition[1066]: INFO : Stage: umount Mar 17 18:51:24.498820 ignition[1066]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Mar 17 18:51:24.498820 ignition[1066]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Mar 17 18:51:24.498820 ignition[1066]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Mar 17 18:51:24.498820 ignition[1066]: INFO : umount: umount passed Mar 17 18:51:24.498820 ignition[1066]: INFO : Ignition finished successfully Mar 17 18:51:24.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.397487 systemd[1]: Stopped target swap.target. Mar 17 18:51:24.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.405782 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Mar 17 18:51:24.405851 systemd[1]: Stopped dracut-pre-mount.service. Mar 17 18:51:24.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.414382 systemd[1]: Stopped target cryptsetup.target. Mar 17 18:51:24.422784 systemd[1]: dracut-initqueue.service: Deactivated successfully. Mar 17 18:51:24.609000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.422838 systemd[1]: Stopped dracut-initqueue.service. Mar 17 18:51:24.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.432075 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Mar 17 18:51:24.432115 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Mar 17 18:51:24.442101 systemd[1]: ignition-files.service: Deactivated successfully. Mar 17 18:51:24.442140 systemd[1]: Stopped ignition-files.service. Mar 17 18:51:24.450879 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Mar 17 18:51:24.450920 systemd[1]: Stopped flatcar-metadata-hostname.service. Mar 17 18:51:24.460932 systemd[1]: Stopping ignition-mount.service... Mar 17 18:51:24.468922 systemd[1]: Stopping iscsid.service... Mar 17 18:51:24.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.474207 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Mar 17 18:51:24.474292 systemd[1]: Stopped kmod-static-nodes.service. Mar 17 18:51:24.495275 systemd[1]: Stopping sysroot-boot.service... Mar 17 18:51:24.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.502486 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Mar 17 18:51:24.502595 systemd[1]: Stopped systemd-udev-trigger.service. Mar 17 18:51:24.511776 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Mar 17 18:51:24.511832 systemd[1]: Stopped dracut-pre-trigger.service. Mar 17 18:51:24.519548 systemd[1]: iscsid.service: Deactivated successfully. Mar 17 18:51:24.519682 systemd[1]: Stopped iscsid.service. Mar 17 18:51:24.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.546329 systemd[1]: initrd-cleanup.service: Deactivated successfully. Mar 17 18:51:24.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.546432 systemd[1]: Finished initrd-cleanup.service. Mar 17 18:51:24.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.557680 systemd[1]: ignition-mount.service: Deactivated successfully. Mar 17 18:51:24.557769 systemd[1]: Stopped ignition-mount.service. Mar 17 18:51:24.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.573237 systemd[1]: sysroot-boot.mount: Deactivated successfully. Mar 17 18:51:24.573661 systemd[1]: ignition-disks.service: Deactivated successfully. Mar 17 18:51:24.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.573709 systemd[1]: Stopped ignition-disks.service. Mar 17 18:51:24.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.581906 systemd[1]: ignition-kargs.service: Deactivated successfully. Mar 17 18:51:24.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.581954 systemd[1]: Stopped ignition-kargs.service. Mar 17 18:51:24.858000 audit: BPF prog-id=6 op=UNLOAD Mar 17 18:51:24.596164 systemd[1]: ignition-fetch.service: Deactivated successfully. Mar 17 18:51:24.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.596211 systemd[1]: Stopped ignition-fetch.service. Mar 17 18:51:24.890000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.610282 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Mar 17 18:51:24.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.610338 systemd[1]: Stopped ignition-fetch-offline.service. Mar 17 18:51:24.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.621445 systemd[1]: Stopped target paths.target. Mar 17 18:51:24.933026 kernel: hv_netvsc 002248b8-bfb2-0022-48b8-bfb2002248b8 eth0: Data path switched from VF: enP6442s1 Mar 17 18:51:24.629636 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Mar 17 18:51:24.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.641547 systemd[1]: Stopped systemd-ask-password-console.path. Mar 17 18:51:24.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.647342 systemd[1]: Stopped target slices.target. Mar 17 18:51:24.661241 systemd[1]: Stopped target sockets.target. Mar 17 18:51:24.671999 systemd[1]: iscsid.socket: Deactivated successfully. Mar 17 18:51:24.672051 systemd[1]: Closed iscsid.socket. Mar 17 18:51:24.680419 systemd[1]: ignition-setup.service: Deactivated successfully. Mar 17 18:51:24.680463 systemd[1]: Stopped ignition-setup.service. Mar 17 18:51:24.688834 systemd[1]: Stopping iscsiuio.service... Mar 17 18:51:24.702628 systemd[1]: iscsiuio.service: Deactivated successfully. Mar 17 18:51:24.702733 systemd[1]: Stopped iscsiuio.service. Mar 17 18:51:24.711676 systemd[1]: Stopped target network.target. Mar 17 18:51:24.720237 systemd[1]: iscsiuio.socket: Deactivated successfully. Mar 17 18:51:24.720279 systemd[1]: Closed iscsiuio.socket. Mar 17 18:51:24.731484 systemd[1]: Stopping systemd-networkd.service... Mar 17 18:51:24.739976 systemd[1]: Stopping systemd-resolved.service... Mar 17 18:51:24.745572 systemd-networkd[871]: eth0: DHCPv6 lease lost Mar 17 18:51:25.018000 audit: BPF prog-id=9 op=UNLOAD Mar 17 18:51:24.754458 systemd[1]: systemd-networkd.service: Deactivated successfully. Mar 17 18:51:25.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:24.754600 systemd[1]: Stopped systemd-networkd.service. Mar 17 18:51:24.764037 systemd[1]: systemd-networkd.socket: Deactivated successfully. Mar 17 18:51:24.764067 systemd[1]: Closed systemd-networkd.socket. Mar 17 18:51:24.769447 systemd[1]: Stopping network-cleanup.service... Mar 17 18:51:24.773637 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Mar 17 18:51:24.773715 systemd[1]: Stopped parse-ip-for-networkd.service. Mar 17 18:51:24.783093 systemd[1]: systemd-sysctl.service: Deactivated successfully. Mar 17 18:51:24.783157 systemd[1]: Stopped systemd-sysctl.service. Mar 17 18:51:24.797105 systemd[1]: systemd-modules-load.service: Deactivated successfully. Mar 17 18:51:24.797164 systemd[1]: Stopped systemd-modules-load.service. Mar 17 18:51:24.811961 systemd[1]: Stopping systemd-udevd.service... Mar 17 18:51:25.110867 systemd-journald[276]: Received SIGTERM from PID 1 (n/a). Mar 17 18:51:24.819340 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Mar 17 18:51:24.819852 systemd[1]: systemd-resolved.service: Deactivated successfully. Mar 17 18:51:24.819944 systemd[1]: Stopped systemd-resolved.service. Mar 17 18:51:24.831699 systemd[1]: systemd-udevd.service: Deactivated successfully. Mar 17 18:51:24.831834 systemd[1]: Stopped systemd-udevd.service. Mar 17 18:51:24.841246 systemd[1]: sysroot-boot.service: Deactivated successfully. Mar 17 18:51:24.841334 systemd[1]: Stopped sysroot-boot.service. Mar 17 18:51:24.849965 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Mar 17 18:51:24.850020 systemd[1]: Closed systemd-udevd-control.socket. Mar 17 18:51:24.859611 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Mar 17 18:51:24.859642 systemd[1]: Closed systemd-udevd-kernel.socket. Mar 17 18:51:24.864316 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Mar 17 18:51:24.864367 systemd[1]: Stopped dracut-pre-udev.service. Mar 17 18:51:24.874357 systemd[1]: dracut-cmdline.service: Deactivated successfully. Mar 17 18:51:24.874401 systemd[1]: Stopped dracut-cmdline.service. Mar 17 18:51:24.891008 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Mar 17 18:51:24.891054 systemd[1]: Stopped dracut-cmdline-ask.service. Mar 17 18:51:24.900092 systemd[1]: initrd-setup-root.service: Deactivated successfully. Mar 17 18:51:24.900137 systemd[1]: Stopped initrd-setup-root.service. Mar 17 18:51:24.910996 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Mar 17 18:51:24.928567 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Mar 17 18:51:24.928666 systemd[1]: Stopped systemd-vconsole-setup.service. Mar 17 18:51:24.939180 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Mar 17 18:51:24.939287 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Mar 17 18:51:25.019471 systemd[1]: network-cleanup.service: Deactivated successfully. Mar 17 18:51:25.019601 systemd[1]: Stopped network-cleanup.service. Mar 17 18:51:25.028848 systemd[1]: Reached target initrd-switch-root.target. Mar 17 18:51:25.040473 systemd[1]: Starting initrd-switch-root.service... Mar 17 18:51:25.060327 systemd[1]: Switching root. Mar 17 18:51:25.111605 systemd-journald[276]: Journal stopped Mar 17 18:51:36.138025 kernel: SELinux: Class mctp_socket not defined in policy. Mar 17 18:51:36.138047 kernel: SELinux: Class anon_inode not defined in policy. Mar 17 18:51:36.138057 kernel: SELinux: the above unknown classes and permissions will be allowed Mar 17 18:51:36.138068 kernel: SELinux: policy capability network_peer_controls=1 Mar 17 18:51:36.138076 kernel: SELinux: policy capability open_perms=1 Mar 17 18:51:36.138083 kernel: SELinux: policy capability extended_socket_class=1 Mar 17 18:51:36.138092 kernel: SELinux: policy capability always_check_network=0 Mar 17 18:51:36.138101 kernel: SELinux: policy capability cgroup_seclabel=1 Mar 17 18:51:36.138108 kernel: SELinux: policy capability nnp_nosuid_transition=1 Mar 17 18:51:36.138116 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Mar 17 18:51:36.138124 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Mar 17 18:51:36.138133 kernel: kauditd_printk_skb: 42 callbacks suppressed Mar 17 18:51:36.138142 kernel: audit: type=1403 audit(1742237487.231:81): auid=4294967295 ses=4294967295 lsm=selinux res=1 Mar 17 18:51:36.138152 systemd[1]: Successfully loaded SELinux policy in 267.684ms. Mar 17 18:51:36.138163 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 21.008ms. Mar 17 18:51:36.138181 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Mar 17 18:51:36.138191 systemd[1]: Detected virtualization microsoft. Mar 17 18:51:36.138200 systemd[1]: Detected architecture arm64. Mar 17 18:51:36.138208 systemd[1]: Detected first boot. Mar 17 18:51:36.138217 systemd[1]: Hostname set to . Mar 17 18:51:36.138226 systemd[1]: Initializing machine ID from random generator. Mar 17 18:51:36.138236 kernel: audit: type=1400 audit(1742237487.938:82): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Mar 17 18:51:36.138247 kernel: audit: type=1400 audit(1742237487.938:83): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Mar 17 18:51:36.138256 kernel: audit: type=1334 audit(1742237487.955:84): prog-id=10 op=LOAD Mar 17 18:51:36.138264 kernel: audit: type=1334 audit(1742237487.955:85): prog-id=10 op=UNLOAD Mar 17 18:51:36.138272 kernel: audit: type=1334 audit(1742237487.972:86): prog-id=11 op=LOAD Mar 17 18:51:36.138282 kernel: audit: type=1334 audit(1742237487.972:87): prog-id=11 op=UNLOAD Mar 17 18:51:36.138291 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Mar 17 18:51:36.138300 kernel: audit: type=1400 audit(1742237489.432:88): avc: denied { associate } for pid=1100 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Mar 17 18:51:36.138311 kernel: audit: type=1300 audit(1742237489.432:88): arch=c00000b7 syscall=5 success=yes exit=0 a0=4000022802 a1=4000028ae0 a2=4000026d00 a3=32 items=0 ppid=1083 pid=1100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:51:36.138321 kernel: audit: type=1327 audit(1742237489.432:88): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Mar 17 18:51:36.138330 systemd[1]: Populated /etc with preset unit settings. Mar 17 18:51:36.138340 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 18:51:36.138349 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 18:51:36.138360 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 18:51:36.138370 kernel: kauditd_printk_skb: 6 callbacks suppressed Mar 17 18:51:36.138378 kernel: audit: type=1334 audit(1742237495.416:90): prog-id=12 op=LOAD Mar 17 18:51:36.138387 kernel: audit: type=1334 audit(1742237495.416:91): prog-id=3 op=UNLOAD Mar 17 18:51:36.138395 kernel: audit: type=1334 audit(1742237495.422:92): prog-id=13 op=LOAD Mar 17 18:51:36.138404 kernel: audit: type=1334 audit(1742237495.428:93): prog-id=14 op=LOAD Mar 17 18:51:36.138414 kernel: audit: type=1334 audit(1742237495.428:94): prog-id=4 op=UNLOAD Mar 17 18:51:36.138424 systemd[1]: initrd-switch-root.service: Deactivated successfully. Mar 17 18:51:36.138433 kernel: audit: type=1334 audit(1742237495.428:95): prog-id=5 op=UNLOAD Mar 17 18:51:36.138442 systemd[1]: Stopped initrd-switch-root.service. Mar 17 18:51:36.138453 kernel: audit: type=1334 audit(1742237495.433:96): prog-id=15 op=LOAD Mar 17 18:51:36.138461 kernel: audit: type=1334 audit(1742237495.433:97): prog-id=12 op=UNLOAD Mar 17 18:51:36.138470 kernel: audit: type=1334 audit(1742237495.439:98): prog-id=16 op=LOAD Mar 17 18:51:36.138479 kernel: audit: type=1334 audit(1742237495.445:99): prog-id=17 op=LOAD Mar 17 18:51:36.138488 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Mar 17 18:51:36.138498 systemd[1]: Created slice system-addon\x2dconfig.slice. Mar 17 18:51:36.138507 systemd[1]: Created slice system-addon\x2drun.slice. Mar 17 18:51:36.138517 systemd[1]: Created slice system-getty.slice. Mar 17 18:51:36.138539 systemd[1]: Created slice system-modprobe.slice. Mar 17 18:51:36.138549 systemd[1]: Created slice system-serial\x2dgetty.slice. Mar 17 18:51:36.138559 systemd[1]: Created slice system-system\x2dcloudinit.slice. Mar 17 18:51:36.138568 systemd[1]: Created slice system-systemd\x2dfsck.slice. Mar 17 18:51:36.138577 systemd[1]: Created slice user.slice. Mar 17 18:51:36.138587 systemd[1]: Started systemd-ask-password-console.path. Mar 17 18:51:36.138596 systemd[1]: Started systemd-ask-password-wall.path. Mar 17 18:51:36.138605 systemd[1]: Set up automount boot.automount. Mar 17 18:51:36.138616 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Mar 17 18:51:36.138625 systemd[1]: Stopped target initrd-switch-root.target. Mar 17 18:51:36.138635 systemd[1]: Stopped target initrd-fs.target. Mar 17 18:51:36.138644 systemd[1]: Stopped target initrd-root-fs.target. Mar 17 18:51:36.138653 systemd[1]: Reached target integritysetup.target. Mar 17 18:51:36.138663 systemd[1]: Reached target remote-cryptsetup.target. Mar 17 18:51:36.138672 systemd[1]: Reached target remote-fs.target. Mar 17 18:51:36.138681 systemd[1]: Reached target slices.target. Mar 17 18:51:36.138693 systemd[1]: Reached target swap.target. Mar 17 18:51:36.138702 systemd[1]: Reached target torcx.target. Mar 17 18:51:36.138711 systemd[1]: Reached target veritysetup.target. Mar 17 18:51:36.138720 systemd[1]: Listening on systemd-coredump.socket. Mar 17 18:51:36.138729 systemd[1]: Listening on systemd-initctl.socket. Mar 17 18:51:36.138739 systemd[1]: Listening on systemd-networkd.socket. Mar 17 18:51:36.138750 systemd[1]: Listening on systemd-udevd-control.socket. Mar 17 18:51:36.138759 systemd[1]: Listening on systemd-udevd-kernel.socket. Mar 17 18:51:36.138768 systemd[1]: Listening on systemd-userdbd.socket. Mar 17 18:51:36.138778 systemd[1]: Mounting dev-hugepages.mount... Mar 17 18:51:36.138787 systemd[1]: Mounting dev-mqueue.mount... Mar 17 18:51:36.138796 systemd[1]: Mounting media.mount... Mar 17 18:51:36.138806 systemd[1]: Mounting sys-kernel-debug.mount... Mar 17 18:51:36.138815 systemd[1]: Mounting sys-kernel-tracing.mount... Mar 17 18:51:36.138826 systemd[1]: Mounting tmp.mount... Mar 17 18:51:36.138835 systemd[1]: Starting flatcar-tmpfiles.service... Mar 17 18:51:36.138845 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:51:36.138855 systemd[1]: Starting kmod-static-nodes.service... Mar 17 18:51:36.138864 systemd[1]: Starting modprobe@configfs.service... Mar 17 18:51:36.138874 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:51:36.138883 systemd[1]: Starting modprobe@drm.service... Mar 17 18:51:36.138893 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:51:36.138903 systemd[1]: Starting modprobe@fuse.service... Mar 17 18:51:36.138913 systemd[1]: Starting modprobe@loop.service... Mar 17 18:51:36.138923 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Mar 17 18:51:36.138933 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Mar 17 18:51:36.138942 systemd[1]: Stopped systemd-fsck-root.service. Mar 17 18:51:36.138951 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Mar 17 18:51:36.138961 systemd[1]: Stopped systemd-fsck-usr.service. Mar 17 18:51:36.138970 kernel: loop: module loaded Mar 17 18:51:36.138979 systemd[1]: Stopped systemd-journald.service. Mar 17 18:51:36.138989 systemd[1]: systemd-journald.service: Consumed 2.844s CPU time. Mar 17 18:51:36.138998 systemd[1]: Starting systemd-journald.service... Mar 17 18:51:36.139008 kernel: fuse: init (API version 7.34) Mar 17 18:51:36.139017 systemd[1]: Starting systemd-modules-load.service... Mar 17 18:51:36.139026 systemd[1]: Starting systemd-network-generator.service... Mar 17 18:51:36.139036 systemd[1]: Starting systemd-remount-fs.service... Mar 17 18:51:36.139046 systemd[1]: Starting systemd-udev-trigger.service... Mar 17 18:51:36.139055 systemd[1]: verity-setup.service: Deactivated successfully. Mar 17 18:51:36.139064 systemd[1]: Stopped verity-setup.service. Mar 17 18:51:36.139075 systemd[1]: Mounted dev-hugepages.mount. Mar 17 18:51:36.139084 systemd[1]: Mounted dev-mqueue.mount. Mar 17 18:51:36.139094 systemd[1]: Mounted media.mount. Mar 17 18:51:36.139103 systemd[1]: Mounted sys-kernel-debug.mount. Mar 17 18:51:36.139118 systemd-journald[1206]: Journal started Mar 17 18:51:36.139157 systemd-journald[1206]: Runtime Journal (/run/log/journal/6f1da8d3636e46c4948848b9caf6d3ff) is 8.0M, max 78.5M, 70.5M free. Mar 17 18:51:27.231000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Mar 17 18:51:27.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Mar 17 18:51:27.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Mar 17 18:51:27.955000 audit: BPF prog-id=10 op=LOAD Mar 17 18:51:27.955000 audit: BPF prog-id=10 op=UNLOAD Mar 17 18:51:27.972000 audit: BPF prog-id=11 op=LOAD Mar 17 18:51:27.972000 audit: BPF prog-id=11 op=UNLOAD Mar 17 18:51:29.432000 audit[1100]: AVC avc: denied { associate } for pid=1100 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Mar 17 18:51:29.432000 audit[1100]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=4000022802 a1=4000028ae0 a2=4000026d00 a3=32 items=0 ppid=1083 pid=1100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:51:29.432000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Mar 17 18:51:29.446000 audit[1100]: AVC avc: denied { associate } for pid=1100 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Mar 17 18:51:29.446000 audit[1100]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40000228d9 a2=1ed a3=0 items=2 ppid=1083 pid=1100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:51:29.446000 audit: CWD cwd="/" Mar 17 18:51:29.446000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:51:29.446000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:51:29.446000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Mar 17 18:51:35.416000 audit: BPF prog-id=12 op=LOAD Mar 17 18:51:35.416000 audit: BPF prog-id=3 op=UNLOAD Mar 17 18:51:35.422000 audit: BPF prog-id=13 op=LOAD Mar 17 18:51:35.428000 audit: BPF prog-id=14 op=LOAD Mar 17 18:51:35.428000 audit: BPF prog-id=4 op=UNLOAD Mar 17 18:51:35.428000 audit: BPF prog-id=5 op=UNLOAD Mar 17 18:51:35.433000 audit: BPF prog-id=15 op=LOAD Mar 17 18:51:35.433000 audit: BPF prog-id=12 op=UNLOAD Mar 17 18:51:35.439000 audit: BPF prog-id=16 op=LOAD Mar 17 18:51:35.445000 audit: BPF prog-id=17 op=LOAD Mar 17 18:51:35.445000 audit: BPF prog-id=13 op=UNLOAD Mar 17 18:51:35.445000 audit: BPF prog-id=14 op=UNLOAD Mar 17 18:51:35.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:35.467000 audit: BPF prog-id=15 op=UNLOAD Mar 17 18:51:35.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:35.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:35.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:35.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:36.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:36.001000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:36.011000 audit: BPF prog-id=18 op=LOAD Mar 17 18:51:36.012000 audit: BPF prog-id=19 op=LOAD Mar 17 18:51:36.012000 audit: BPF prog-id=20 op=LOAD Mar 17 18:51:36.012000 audit: BPF prog-id=16 op=UNLOAD Mar 17 18:51:36.012000 audit: BPF prog-id=17 op=UNLOAD Mar 17 18:51:36.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:36.135000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Mar 17 18:51:36.135000 audit[1206]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=5 a1=ffffcab52390 a2=4000 a3=1 items=0 ppid=1 pid=1206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:51:36.135000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Mar 17 18:51:35.415377 systemd[1]: Queued start job for default target multi-user.target. Mar 17 18:51:29.382866 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2025-03-17T18:51:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 18:51:35.415390 systemd[1]: Unnecessary job was removed for dev-sda6.device. Mar 17 18:51:29.414511 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2025-03-17T18:51:29Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Mar 17 18:51:35.446101 systemd[1]: systemd-journald.service: Deactivated successfully. Mar 17 18:51:29.414574 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2025-03-17T18:51:29Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Mar 17 18:51:35.446485 systemd[1]: systemd-journald.service: Consumed 2.844s CPU time. Mar 17 18:51:29.414618 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2025-03-17T18:51:29Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Mar 17 18:51:29.414629 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2025-03-17T18:51:29Z" level=debug msg="skipped missing lower profile" missing profile=oem Mar 17 18:51:29.414668 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2025-03-17T18:51:29Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Mar 17 18:51:29.414680 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2025-03-17T18:51:29Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Mar 17 18:51:29.414881 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2025-03-17T18:51:29Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Mar 17 18:51:29.414913 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2025-03-17T18:51:29Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Mar 17 18:51:29.414924 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2025-03-17T18:51:29Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Mar 17 18:51:29.415298 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2025-03-17T18:51:29Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Mar 17 18:51:29.415333 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2025-03-17T18:51:29Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Mar 17 18:51:29.415352 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2025-03-17T18:51:29Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 Mar 17 18:51:29.415365 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2025-03-17T18:51:29Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Mar 17 18:51:29.415381 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2025-03-17T18:51:29Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 Mar 17 18:51:29.415393 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2025-03-17T18:51:29Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Mar 17 18:51:34.271271 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2025-03-17T18:51:34Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 18:51:34.271551 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2025-03-17T18:51:34Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 18:51:34.271666 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2025-03-17T18:51:34Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 18:51:34.271828 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2025-03-17T18:51:34Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Mar 17 18:51:34.271879 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2025-03-17T18:51:34Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Mar 17 18:51:34.271933 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2025-03-17T18:51:34Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Mar 17 18:51:36.154681 systemd[1]: Started systemd-journald.service. Mar 17 18:51:36.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:36.155509 systemd[1]: Mounted sys-kernel-tracing.mount. Mar 17 18:51:36.160205 systemd[1]: Mounted tmp.mount. Mar 17 18:51:36.164181 systemd[1]: Finished flatcar-tmpfiles.service. Mar 17 18:51:36.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:36.170832 systemd[1]: Finished kmod-static-nodes.service. Mar 17 18:51:36.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:36.175841 systemd[1]: modprobe@configfs.service: Deactivated successfully. Mar 17 18:51:36.175978 systemd[1]: Finished modprobe@configfs.service. Mar 17 18:51:36.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:36.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:36.181109 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:51:36.181237 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:51:36.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:36.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:36.186017 systemd[1]: modprobe@drm.service: Deactivated successfully. Mar 17 18:51:36.186181 systemd[1]: Finished modprobe@drm.service. Mar 17 18:51:36.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:36.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:36.191318 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:51:36.191453 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:51:36.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:36.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:36.196620 systemd[1]: modprobe@fuse.service: Deactivated successfully. Mar 17 18:51:36.196756 systemd[1]: Finished modprobe@fuse.service. Mar 17 18:51:36.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:36.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:36.201555 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:51:36.201683 systemd[1]: Finished modprobe@loop.service. Mar 17 18:51:36.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:36.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:36.206555 systemd[1]: Finished systemd-modules-load.service. Mar 17 18:51:36.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:36.211752 systemd[1]: Finished systemd-network-generator.service. Mar 17 18:51:36.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:36.217478 systemd[1]: Finished systemd-remount-fs.service. Mar 17 18:51:36.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:36.222507 systemd[1]: Finished systemd-udev-trigger.service. Mar 17 18:51:36.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:36.227994 systemd[1]: Reached target network-pre.target. Mar 17 18:51:36.233944 systemd[1]: Mounting sys-fs-fuse-connections.mount... Mar 17 18:51:36.239751 systemd[1]: Mounting sys-kernel-config.mount... Mar 17 18:51:36.244226 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Mar 17 18:51:36.258204 systemd[1]: Starting systemd-hwdb-update.service... Mar 17 18:51:36.264317 systemd[1]: Starting systemd-journal-flush.service... Mar 17 18:51:36.268930 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 18:51:36.270292 systemd[1]: Starting systemd-random-seed.service... Mar 17 18:51:36.274875 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 18:51:36.276186 systemd[1]: Starting systemd-sysctl.service... Mar 17 18:51:36.281698 systemd[1]: Starting systemd-sysusers.service... Mar 17 18:51:36.287139 systemd[1]: Starting systemd-udev-settle.service... Mar 17 18:51:36.293659 systemd[1]: Mounted sys-fs-fuse-connections.mount. Mar 17 18:51:36.298836 systemd[1]: Mounted sys-kernel-config.mount. Mar 17 18:51:36.306219 udevadm[1220]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Mar 17 18:51:36.327075 systemd[1]: Finished systemd-random-seed.service. Mar 17 18:51:36.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:36.332822 systemd[1]: Reached target first-boot-complete.target. Mar 17 18:51:36.339493 systemd-journald[1206]: Time spent on flushing to /var/log/journal/6f1da8d3636e46c4948848b9caf6d3ff is 13.564ms for 1075 entries. Mar 17 18:51:36.339493 systemd-journald[1206]: System Journal (/var/log/journal/6f1da8d3636e46c4948848b9caf6d3ff) is 8.0M, max 2.6G, 2.6G free. Mar 17 18:51:36.412440 systemd-journald[1206]: Received client request to flush runtime journal. Mar 17 18:51:36.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:36.349050 systemd[1]: Finished systemd-sysctl.service. Mar 17 18:51:36.413404 systemd[1]: Finished systemd-journal-flush.service. Mar 17 18:51:36.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:36.742973 systemd[1]: Finished systemd-sysusers.service. Mar 17 18:51:36.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:37.305333 systemd[1]: Finished systemd-hwdb-update.service. Mar 17 18:51:37.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:37.310000 audit: BPF prog-id=21 op=LOAD Mar 17 18:51:37.310000 audit: BPF prog-id=22 op=LOAD Mar 17 18:51:37.310000 audit: BPF prog-id=7 op=UNLOAD Mar 17 18:51:37.310000 audit: BPF prog-id=8 op=UNLOAD Mar 17 18:51:37.312137 systemd[1]: Starting systemd-udevd.service... Mar 17 18:51:37.331518 systemd-udevd[1223]: Using default interface naming scheme 'v252'. Mar 17 18:51:37.649183 systemd[1]: Started systemd-udevd.service. Mar 17 18:51:37.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:37.666000 audit: BPF prog-id=23 op=LOAD Mar 17 18:51:37.667680 systemd[1]: Starting systemd-networkd.service... Mar 17 18:51:37.690043 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Mar 17 18:51:37.699000 audit: BPF prog-id=24 op=LOAD Mar 17 18:51:37.699000 audit: BPF prog-id=25 op=LOAD Mar 17 18:51:37.699000 audit: BPF prog-id=26 op=LOAD Mar 17 18:51:37.700958 systemd[1]: Starting systemd-userdbd.service... Mar 17 18:51:37.744760 systemd[1]: Started systemd-userdbd.service. Mar 17 18:51:37.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:37.770649 kernel: mousedev: PS/2 mouse device common for all mice Mar 17 18:51:37.808000 audit[1229]: AVC avc: denied { confidentiality } for pid=1229 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Mar 17 18:51:37.823614 kernel: hv_vmbus: registering driver hv_balloon Mar 17 18:51:37.827930 kernel: hv_vmbus: registering driver hyperv_fb Mar 17 18:51:37.827978 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Mar 17 18:51:37.834499 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Mar 17 18:51:37.838648 kernel: hv_utils: Registering HyperV Utility Driver Mar 17 18:51:37.846234 kernel: Console: switching to colour dummy device 80x25 Mar 17 18:51:37.846316 kernel: hv_vmbus: registering driver hv_utils Mar 17 18:51:37.854546 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Mar 17 18:51:37.854668 kernel: hv_balloon: Memory hot add disabled on ARM64 Mar 17 18:51:37.865654 kernel: Console: switching to colour frame buffer device 128x48 Mar 17 18:51:37.888963 kernel: hv_utils: Heartbeat IC version 3.0 Mar 17 18:51:37.889073 kernel: hv_utils: Shutdown IC version 3.2 Mar 17 18:51:37.889094 kernel: hv_utils: TimeSync IC version 4.0 Mar 17 18:51:37.808000 audit[1229]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab0243c410 a1=aa2c a2=ffff9b7924b0 a3=aaab0239c010 items=12 ppid=1223 pid=1229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:51:37.808000 audit: CWD cwd="/" Mar 17 18:51:37.808000 audit: PATH item=0 name=(null) inode=6383 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:51:37.808000 audit: PATH item=1 name=(null) inode=10857 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:51:37.808000 audit: PATH item=2 name=(null) inode=10857 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:51:37.808000 audit: PATH item=3 name=(null) inode=10858 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:51:37.808000 audit: PATH item=4 name=(null) inode=10857 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:51:37.808000 audit: PATH item=5 name=(null) inode=10859 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:51:37.808000 audit: PATH item=6 name=(null) inode=10857 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:51:37.808000 audit: PATH item=7 name=(null) inode=10860 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:51:37.808000 audit: PATH item=8 name=(null) inode=10857 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:51:37.808000 audit: PATH item=9 name=(null) inode=10861 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:51:37.808000 audit: PATH item=10 name=(null) inode=10857 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:51:37.808000 audit: PATH item=11 name=(null) inode=10862 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:51:37.808000 audit: PROCTITLE proctitle="(udev-worker)" Mar 17 18:51:38.233556 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Mar 17 18:51:38.239275 systemd[1]: Finished systemd-udev-settle.service. Mar 17 18:51:38.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:38.245694 systemd[1]: Starting lvm2-activation-early.service... Mar 17 18:51:38.253329 systemd-networkd[1244]: lo: Link UP Mar 17 18:51:38.253337 systemd-networkd[1244]: lo: Gained carrier Mar 17 18:51:38.253756 systemd-networkd[1244]: Enumeration completed Mar 17 18:51:38.253857 systemd[1]: Started systemd-networkd.service. Mar 17 18:51:38.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:38.260093 systemd[1]: Starting systemd-networkd-wait-online.service... Mar 17 18:51:38.280965 systemd-networkd[1244]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Mar 17 18:51:38.331476 kernel: mlx5_core 192a:00:02.0 enP6442s1: Link up Mar 17 18:51:38.357474 kernel: hv_netvsc 002248b8-bfb2-0022-48b8-bfb2002248b8 eth0: Data path switched to VF: enP6442s1 Mar 17 18:51:38.359014 systemd-networkd[1244]: enP6442s1: Link UP Mar 17 18:51:38.359323 systemd-networkd[1244]: eth0: Link UP Mar 17 18:51:38.359350 systemd-networkd[1244]: eth0: Gained carrier Mar 17 18:51:38.364006 systemd-networkd[1244]: enP6442s1: Gained carrier Mar 17 18:51:38.371579 systemd-networkd[1244]: eth0: DHCPv4 address 10.200.20.21/24, gateway 10.200.20.1 acquired from 168.63.129.16 Mar 17 18:51:38.555311 lvm[1301]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Mar 17 18:51:38.601462 systemd[1]: Finished lvm2-activation-early.service. Mar 17 18:51:38.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:38.606642 systemd[1]: Reached target cryptsetup.target. Mar 17 18:51:38.612396 systemd[1]: Starting lvm2-activation.service... Mar 17 18:51:38.616799 lvm[1303]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Mar 17 18:51:38.639413 systemd[1]: Finished lvm2-activation.service. Mar 17 18:51:38.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:38.644108 systemd[1]: Reached target local-fs-pre.target. Mar 17 18:51:38.648743 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Mar 17 18:51:38.648774 systemd[1]: Reached target local-fs.target. Mar 17 18:51:38.653225 systemd[1]: Reached target machines.target. Mar 17 18:51:38.659042 systemd[1]: Starting ldconfig.service... Mar 17 18:51:38.662828 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:51:38.662894 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:51:38.664235 systemd[1]: Starting systemd-boot-update.service... Mar 17 18:51:38.669748 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Mar 17 18:51:38.676531 systemd[1]: Starting systemd-machine-id-commit.service... Mar 17 18:51:38.682578 systemd[1]: Starting systemd-sysext.service... Mar 17 18:51:38.714221 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1305 (bootctl) Mar 17 18:51:38.716706 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Mar 17 18:51:38.745793 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Mar 17 18:51:38.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:38.936360 systemd[1]: Unmounting usr-share-oem.mount... Mar 17 18:51:39.034650 systemd[1]: usr-share-oem.mount: Deactivated successfully. Mar 17 18:51:39.034906 systemd[1]: Unmounted usr-share-oem.mount. Mar 17 18:51:39.085487 kernel: loop0: detected capacity change from 0 to 189592 Mar 17 18:51:39.091165 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Mar 17 18:51:39.092352 systemd[1]: Finished systemd-machine-id-commit.service. Mar 17 18:51:39.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.120991 systemd-fsck[1312]: fsck.fat 4.2 (2021-01-31) Mar 17 18:51:39.120991 systemd-fsck[1312]: /dev/sda1: 236 files, 117179/258078 clusters Mar 17 18:51:39.122502 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Mar 17 18:51:39.125445 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Mar 17 18:51:39.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.135058 systemd[1]: Mounting boot.mount... Mar 17 18:51:39.151483 kernel: loop1: detected capacity change from 0 to 189592 Mar 17 18:51:39.154318 systemd[1]: Mounted boot.mount. Mar 17 18:51:39.160411 (sd-sysext)[1321]: Using extensions 'kubernetes'. Mar 17 18:51:39.161129 (sd-sysext)[1321]: Merged extensions into '/usr'. Mar 17 18:51:39.166827 systemd[1]: Finished systemd-boot-update.service. Mar 17 18:51:39.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.182491 systemd[1]: Mounting usr-share-oem.mount... Mar 17 18:51:39.186829 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:51:39.188563 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:51:39.194174 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:51:39.200182 systemd[1]: Starting modprobe@loop.service... Mar 17 18:51:39.204435 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:51:39.204725 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:51:39.207538 systemd[1]: Mounted usr-share-oem.mount. Mar 17 18:51:39.212384 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:51:39.212718 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:51:39.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.217000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.218725 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:51:39.219038 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:51:39.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.226125 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:51:39.226419 systemd[1]: Finished modprobe@loop.service. Mar 17 18:51:39.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.232869 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 18:51:39.233116 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 18:51:39.234855 systemd[1]: Finished systemd-sysext.service. Mar 17 18:51:39.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.242641 systemd[1]: Starting ensure-sysext.service... Mar 17 18:51:39.249266 systemd[1]: Starting systemd-tmpfiles-setup.service... Mar 17 18:51:39.257883 systemd[1]: Reloading. Mar 17 18:51:39.310990 /usr/lib/systemd/system-generators/torcx-generator[1347]: time="2025-03-17T18:51:39Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 18:51:39.311017 /usr/lib/systemd/system-generators/torcx-generator[1347]: time="2025-03-17T18:51:39Z" level=info msg="torcx already run" Mar 17 18:51:39.418677 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 18:51:39.418717 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 18:51:39.431975 systemd-tmpfiles[1328]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Mar 17 18:51:39.437468 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 18:51:39.516000 audit: BPF prog-id=27 op=LOAD Mar 17 18:51:39.516000 audit: BPF prog-id=23 op=UNLOAD Mar 17 18:51:39.517000 audit: BPF prog-id=28 op=LOAD Mar 17 18:51:39.517000 audit: BPF prog-id=18 op=UNLOAD Mar 17 18:51:39.517000 audit: BPF prog-id=29 op=LOAD Mar 17 18:51:39.517000 audit: BPF prog-id=30 op=LOAD Mar 17 18:51:39.517000 audit: BPF prog-id=19 op=UNLOAD Mar 17 18:51:39.517000 audit: BPF prog-id=20 op=UNLOAD Mar 17 18:51:39.518000 audit: BPF prog-id=31 op=LOAD Mar 17 18:51:39.518000 audit: BPF prog-id=32 op=LOAD Mar 17 18:51:39.518000 audit: BPF prog-id=21 op=UNLOAD Mar 17 18:51:39.518000 audit: BPF prog-id=22 op=UNLOAD Mar 17 18:51:39.518000 audit: BPF prog-id=33 op=LOAD Mar 17 18:51:39.518000 audit: BPF prog-id=24 op=UNLOAD Mar 17 18:51:39.518000 audit: BPF prog-id=34 op=LOAD Mar 17 18:51:39.519000 audit: BPF prog-id=35 op=LOAD Mar 17 18:51:39.519000 audit: BPF prog-id=25 op=UNLOAD Mar 17 18:51:39.519000 audit: BPF prog-id=26 op=UNLOAD Mar 17 18:51:39.531145 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:51:39.532858 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:51:39.538393 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:51:39.543944 systemd[1]: Starting modprobe@loop.service... Mar 17 18:51:39.547727 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:51:39.547870 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:51:39.548833 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:51:39.548991 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:51:39.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.554082 systemd-tmpfiles[1328]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Mar 17 18:51:39.554105 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:51:39.554242 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:51:39.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.559391 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:51:39.559703 systemd[1]: Finished modprobe@loop.service. Mar 17 18:51:39.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.565724 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:51:39.567131 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:51:39.572671 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:51:39.578074 systemd[1]: Starting modprobe@loop.service... Mar 17 18:51:39.582287 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:51:39.582436 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:51:39.583322 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:51:39.583581 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:51:39.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.588522 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:51:39.588656 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:51:39.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.593911 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:51:39.594063 systemd[1]: Finished modprobe@loop.service. Mar 17 18:51:39.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.598918 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 18:51:39.599035 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 18:51:39.601669 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Mar 17 18:51:39.603090 systemd[1]: Starting modprobe@dm_mod.service... Mar 17 18:51:39.608426 systemd[1]: Starting modprobe@drm.service... Mar 17 18:51:39.613757 systemd[1]: Starting modprobe@efi_pstore.service... Mar 17 18:51:39.619270 systemd[1]: Starting modprobe@loop.service... Mar 17 18:51:39.623153 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Mar 17 18:51:39.623293 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:51:39.624335 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Mar 17 18:51:39.624529 systemd[1]: Finished modprobe@dm_mod.service. Mar 17 18:51:39.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.628000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.629779 systemd[1]: modprobe@drm.service: Deactivated successfully. Mar 17 18:51:39.629916 systemd[1]: Finished modprobe@drm.service. Mar 17 18:51:39.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.635480 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Mar 17 18:51:39.635612 systemd[1]: Finished modprobe@efi_pstore.service. Mar 17 18:51:39.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.640777 systemd[1]: modprobe@loop.service: Deactivated successfully. Mar 17 18:51:39.640904 systemd[1]: Finished modprobe@loop.service. Mar 17 18:51:39.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.646106 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Mar 17 18:51:39.646184 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Mar 17 18:51:39.647328 systemd[1]: Finished ensure-sysext.service. Mar 17 18:51:39.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:39.667384 systemd-tmpfiles[1328]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Mar 17 18:51:39.908599 systemd-networkd[1244]: eth0: Gained IPv6LL Mar 17 18:51:39.915409 systemd[1]: Finished systemd-networkd-wait-online.service. Mar 17 18:51:39.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:40.223229 systemd[1]: Finished systemd-tmpfiles-setup.service. Mar 17 18:51:40.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:40.229837 systemd[1]: Starting audit-rules.service... Mar 17 18:51:40.235151 systemd[1]: Starting clean-ca-certificates.service... Mar 17 18:51:40.241586 systemd[1]: Starting systemd-journal-catalog-update.service... Mar 17 18:51:40.247000 audit: BPF prog-id=36 op=LOAD Mar 17 18:51:40.249029 systemd[1]: Starting systemd-resolved.service... Mar 17 18:51:40.254000 audit: BPF prog-id=37 op=LOAD Mar 17 18:51:40.256332 systemd[1]: Starting systemd-timesyncd.service... Mar 17 18:51:40.262068 systemd[1]: Starting systemd-update-utmp.service... Mar 17 18:51:40.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:40.290780 systemd[1]: Finished clean-ca-certificates.service. Mar 17 18:51:40.296010 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Mar 17 18:51:40.299000 audit[1424]: SYSTEM_BOOT pid=1424 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Mar 17 18:51:40.302868 systemd[1]: Finished systemd-update-utmp.service. Mar 17 18:51:40.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:40.350004 systemd[1]: Started systemd-timesyncd.service. Mar 17 18:51:40.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:40.354699 systemd[1]: Reached target time-set.target. Mar 17 18:51:40.397433 systemd-resolved[1421]: Positive Trust Anchors: Mar 17 18:51:40.397446 systemd-resolved[1421]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Mar 17 18:51:40.397485 systemd-resolved[1421]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Mar 17 18:51:40.409151 systemd[1]: Finished systemd-journal-catalog-update.service. Mar 17 18:51:40.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:40.478108 systemd-resolved[1421]: Using system hostname 'ci-3510.3.7-a-78f2e87fa3'. Mar 17 18:51:40.479844 systemd[1]: Started systemd-resolved.service. Mar 17 18:51:40.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:51:40.484602 systemd[1]: Reached target network.target. Mar 17 18:51:40.488846 systemd[1]: Reached target network-online.target. Mar 17 18:51:40.493868 systemd[1]: Reached target nss-lookup.target. Mar 17 18:51:40.621000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Mar 17 18:51:40.622837 augenrules[1439]: No rules Mar 17 18:51:40.626514 kernel: kauditd_printk_skb: 133 callbacks suppressed Mar 17 18:51:40.626572 kernel: audit: type=1305 audit(1742237500.621:216): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Mar 17 18:51:40.627373 systemd[1]: Finished audit-rules.service. Mar 17 18:51:40.621000 audit[1439]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd1cb0750 a2=420 a3=0 items=0 ppid=1418 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:51:40.664172 kernel: audit: type=1300 audit(1742237500.621:216): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd1cb0750 a2=420 a3=0 items=0 ppid=1418 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:51:40.664289 systemd-timesyncd[1423]: Contacted time server 129.146.193.200:123 (0.flatcar.pool.ntp.org). Mar 17 18:51:40.621000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Mar 17 18:51:40.664361 systemd-timesyncd[1423]: Initial clock synchronization to Mon 2025-03-17 18:51:40.654981 UTC. Mar 17 18:51:40.674239 kernel: audit: type=1327 audit(1742237500.621:216): proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Mar 17 18:51:45.694554 ldconfig[1304]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Mar 17 18:51:45.710232 systemd[1]: Finished ldconfig.service. Mar 17 18:51:45.716540 systemd[1]: Starting systemd-update-done.service... Mar 17 18:51:45.739060 systemd[1]: Finished systemd-update-done.service. Mar 17 18:51:45.744249 systemd[1]: Reached target sysinit.target. Mar 17 18:51:45.748730 systemd[1]: Started motdgen.path. Mar 17 18:51:45.753306 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Mar 17 18:51:45.760023 systemd[1]: Started logrotate.timer. Mar 17 18:51:45.764179 systemd[1]: Started mdadm.timer. Mar 17 18:51:45.768607 systemd[1]: Started systemd-tmpfiles-clean.timer. Mar 17 18:51:45.773422 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Mar 17 18:51:45.773508 systemd[1]: Reached target paths.target. Mar 17 18:51:45.777851 systemd[1]: Reached target timers.target. Mar 17 18:51:45.783092 systemd[1]: Listening on dbus.socket. Mar 17 18:51:45.788534 systemd[1]: Starting docker.socket... Mar 17 18:51:45.819417 systemd[1]: Listening on sshd.socket. Mar 17 18:51:45.823636 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:51:45.824220 systemd[1]: Listening on docker.socket. Mar 17 18:51:45.828539 systemd[1]: Reached target sockets.target. Mar 17 18:51:45.833281 systemd[1]: Reached target basic.target. Mar 17 18:51:45.837770 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Mar 17 18:51:45.837800 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Mar 17 18:51:45.839057 systemd[1]: Starting containerd.service... Mar 17 18:51:45.844258 systemd[1]: Starting dbus.service... Mar 17 18:51:45.849148 systemd[1]: Starting enable-oem-cloudinit.service... Mar 17 18:51:45.855057 systemd[1]: Starting extend-filesystems.service... Mar 17 18:51:45.862563 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Mar 17 18:51:45.863976 systemd[1]: Starting kubelet.service... Mar 17 18:51:45.869049 systemd[1]: Starting motdgen.service... Mar 17 18:51:45.873854 systemd[1]: Started nvidia.service. Mar 17 18:51:45.879914 systemd[1]: Starting ssh-key-proc-cmdline.service... Mar 17 18:51:45.885777 systemd[1]: Starting sshd-keygen.service... Mar 17 18:51:45.894055 systemd[1]: Starting systemd-logind.service... Mar 17 18:51:45.898567 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Mar 17 18:51:45.898644 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Mar 17 18:51:45.899170 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Mar 17 18:51:45.900141 systemd[1]: Starting update-engine.service... Mar 17 18:51:45.906328 systemd[1]: Starting update-ssh-keys-after-ignition.service... Mar 17 18:51:45.916421 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Mar 17 18:51:45.916697 systemd[1]: Finished ssh-key-proc-cmdline.service. Mar 17 18:51:45.927733 jq[1466]: true Mar 17 18:51:45.928698 jq[1449]: false Mar 17 18:51:45.939971 systemd[1]: motdgen.service: Deactivated successfully. Mar 17 18:51:45.940175 systemd[1]: Finished motdgen.service. Mar 17 18:51:45.947760 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Mar 17 18:51:45.947968 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Mar 17 18:51:45.985437 jq[1474]: true Mar 17 18:51:45.992267 extend-filesystems[1450]: Found loop1 Mar 17 18:51:45.992267 extend-filesystems[1450]: Found sda Mar 17 18:51:45.992267 extend-filesystems[1450]: Found sda1 Mar 17 18:51:45.992267 extend-filesystems[1450]: Found sda2 Mar 17 18:51:45.992267 extend-filesystems[1450]: Found sda3 Mar 17 18:51:45.992267 extend-filesystems[1450]: Found usr Mar 17 18:51:45.992267 extend-filesystems[1450]: Found sda4 Mar 17 18:51:45.992267 extend-filesystems[1450]: Found sda6 Mar 17 18:51:45.992267 extend-filesystems[1450]: Found sda7 Mar 17 18:51:45.992267 extend-filesystems[1450]: Found sda9 Mar 17 18:51:45.992267 extend-filesystems[1450]: Checking size of /dev/sda9 Mar 17 18:51:46.109418 extend-filesystems[1450]: Old size kept for /dev/sda9 Mar 17 18:51:46.109418 extend-filesystems[1450]: Found sr0 Mar 17 18:51:46.037562 systemd-logind[1459]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Mar 17 18:51:46.131896 env[1471]: time="2025-03-17T18:51:46.068764211Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Mar 17 18:51:46.132025 bash[1498]: Updated "/home/core/.ssh/authorized_keys" Mar 17 18:51:46.041679 systemd-logind[1459]: New seat seat0. Mar 17 18:51:46.085288 systemd[1]: extend-filesystems.service: Deactivated successfully. Mar 17 18:51:46.085501 systemd[1]: Finished extend-filesystems.service. Mar 17 18:51:46.125624 systemd[1]: Finished update-ssh-keys-after-ignition.service. Mar 17 18:51:46.148219 dbus-daemon[1448]: [system] SELinux support is enabled Mar 17 18:51:46.154835 env[1471]: time="2025-03-17T18:51:46.152326996Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Mar 17 18:51:46.154835 env[1471]: time="2025-03-17T18:51:46.152524713Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Mar 17 18:51:46.148440 systemd[1]: Started dbus.service. Mar 17 18:51:46.156834 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Mar 17 18:51:46.163512 env[1471]: time="2025-03-17T18:51:46.160505592Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.179-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Mar 17 18:51:46.163512 env[1471]: time="2025-03-17T18:51:46.160542976Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Mar 17 18:51:46.163512 env[1471]: time="2025-03-17T18:51:46.160788674Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Mar 17 18:51:46.163512 env[1471]: time="2025-03-17T18:51:46.160807027Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Mar 17 18:51:46.163512 env[1471]: time="2025-03-17T18:51:46.160821181Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Mar 17 18:51:46.163512 env[1471]: time="2025-03-17T18:51:46.160833016Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Mar 17 18:51:46.163512 env[1471]: time="2025-03-17T18:51:46.160903586Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Mar 17 18:51:46.163512 env[1471]: time="2025-03-17T18:51:46.161210938Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Mar 17 18:51:46.163512 env[1471]: time="2025-03-17T18:51:46.161359836Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Mar 17 18:51:46.163512 env[1471]: time="2025-03-17T18:51:46.161375510Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Mar 17 18:51:46.157389 dbus-daemon[1448]: [system] Successfully activated service 'org.freedesktop.systemd1' Mar 17 18:51:46.156864 systemd[1]: Reached target system-config.target. Mar 17 18:51:46.163870 env[1471]: time="2025-03-17T18:51:46.161445241Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Mar 17 18:51:46.163870 env[1471]: time="2025-03-17T18:51:46.161473989Z" level=info msg="metadata content store policy set" policy=shared Mar 17 18:51:46.164968 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Mar 17 18:51:46.164997 systemd[1]: Reached target user-config.target. Mar 17 18:51:46.170042 systemd[1]: Started systemd-logind.service. Mar 17 18:51:46.196008 env[1471]: time="2025-03-17T18:51:46.195947323Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Mar 17 18:51:46.196008 env[1471]: time="2025-03-17T18:51:46.196002500Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Mar 17 18:51:46.196008 env[1471]: time="2025-03-17T18:51:46.196016854Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Mar 17 18:51:46.196176 env[1471]: time="2025-03-17T18:51:46.196055358Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Mar 17 18:51:46.196176 env[1471]: time="2025-03-17T18:51:46.196070751Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Mar 17 18:51:46.196176 env[1471]: time="2025-03-17T18:51:46.196085225Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Mar 17 18:51:46.196176 env[1471]: time="2025-03-17T18:51:46.196100259Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Mar 17 18:51:46.196522 env[1471]: time="2025-03-17T18:51:46.196495654Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Mar 17 18:51:46.196522 env[1471]: time="2025-03-17T18:51:46.196522123Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Mar 17 18:51:46.196600 env[1471]: time="2025-03-17T18:51:46.196535798Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Mar 17 18:51:46.196600 env[1471]: time="2025-03-17T18:51:46.196549432Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Mar 17 18:51:46.196600 env[1471]: time="2025-03-17T18:51:46.196563546Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Mar 17 18:51:46.196742 env[1471]: time="2025-03-17T18:51:46.196717962Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Mar 17 18:51:46.196823 env[1471]: time="2025-03-17T18:51:46.196804166Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Mar 17 18:51:46.197061 env[1471]: time="2025-03-17T18:51:46.197040308Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Mar 17 18:51:46.197094 env[1471]: time="2025-03-17T18:51:46.197072054Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Mar 17 18:51:46.197094 env[1471]: time="2025-03-17T18:51:46.197089007Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Mar 17 18:51:46.197154 env[1471]: time="2025-03-17T18:51:46.197134868Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Mar 17 18:51:46.197233 env[1471]: time="2025-03-17T18:51:46.197153780Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Mar 17 18:51:46.197233 env[1471]: time="2025-03-17T18:51:46.197167935Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Mar 17 18:51:46.197295 env[1471]: time="2025-03-17T18:51:46.197180209Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Mar 17 18:51:46.197327 env[1471]: time="2025-03-17T18:51:46.197294642Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Mar 17 18:51:46.197327 env[1471]: time="2025-03-17T18:51:46.197312354Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Mar 17 18:51:46.197364 env[1471]: time="2025-03-17T18:51:46.197331706Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Mar 17 18:51:46.197364 env[1471]: time="2025-03-17T18:51:46.197344421Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Mar 17 18:51:46.197364 env[1471]: time="2025-03-17T18:51:46.197360534Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Mar 17 18:51:46.197538 env[1471]: time="2025-03-17T18:51:46.197515990Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Mar 17 18:51:46.197576 env[1471]: time="2025-03-17T18:51:46.197540739Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Mar 17 18:51:46.197576 env[1471]: time="2025-03-17T18:51:46.197554814Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Mar 17 18:51:46.197576 env[1471]: time="2025-03-17T18:51:46.197566649Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Mar 17 18:51:46.197650 env[1471]: time="2025-03-17T18:51:46.197581043Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Mar 17 18:51:46.197650 env[1471]: time="2025-03-17T18:51:46.197593358Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Mar 17 18:51:46.197650 env[1471]: time="2025-03-17T18:51:46.197611350Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Mar 17 18:51:46.197650 env[1471]: time="2025-03-17T18:51:46.197646535Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Mar 17 18:51:46.197903 env[1471]: time="2025-03-17T18:51:46.197844933Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Mar 17 18:51:46.213698 env[1471]: time="2025-03-17T18:51:46.197907187Z" level=info msg="Connect containerd service" Mar 17 18:51:46.213698 env[1471]: time="2025-03-17T18:51:46.197947090Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Mar 17 18:51:46.213698 env[1471]: time="2025-03-17T18:51:46.198643640Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Mar 17 18:51:46.213698 env[1471]: time="2025-03-17T18:51:46.198921005Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Mar 17 18:51:46.213698 env[1471]: time="2025-03-17T18:51:46.198956190Z" level=info msg=serving... address=/run/containerd/containerd.sock Mar 17 18:51:46.213698 env[1471]: time="2025-03-17T18:51:46.204273458Z" level=info msg="containerd successfully booted in 0.142116s" Mar 17 18:51:46.213698 env[1471]: time="2025-03-17T18:51:46.206170988Z" level=info msg="Start subscribing containerd event" Mar 17 18:51:46.213698 env[1471]: time="2025-03-17T18:51:46.206240039Z" level=info msg="Start recovering state" Mar 17 18:51:46.213698 env[1471]: time="2025-03-17T18:51:46.206328322Z" level=info msg="Start event monitor" Mar 17 18:51:46.213698 env[1471]: time="2025-03-17T18:51:46.206370905Z" level=info msg="Start snapshots syncer" Mar 17 18:51:46.213698 env[1471]: time="2025-03-17T18:51:46.206383539Z" level=info msg="Start cni network conf syncer for default" Mar 17 18:51:46.213698 env[1471]: time="2025-03-17T18:51:46.206472502Z" level=info msg="Start streaming server" Mar 17 18:51:46.199082 systemd[1]: Started containerd.service. Mar 17 18:51:46.257200 systemd[1]: nvidia.service: Deactivated successfully. Mar 17 18:51:46.545124 update_engine[1464]: I0317 18:51:46.532223 1464 main.cc:92] Flatcar Update Engine starting Mar 17 18:51:46.588842 systemd[1]: Started update-engine.service. Mar 17 18:51:46.595675 update_engine[1464]: I0317 18:51:46.595628 1464 update_check_scheduler.cc:74] Next update check in 8m50s Mar 17 18:51:46.596312 systemd[1]: Started locksmithd.service. Mar 17 18:51:46.736833 systemd[1]: Started kubelet.service. Mar 17 18:51:47.171002 kubelet[1551]: E0317 18:51:47.170936 1551 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 18:51:47.172832 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 18:51:47.172976 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 18:51:47.244373 sshd_keygen[1465]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Mar 17 18:51:47.264497 systemd[1]: Finished sshd-keygen.service. Mar 17 18:51:47.270826 systemd[1]: Starting issuegen.service... Mar 17 18:51:47.275970 systemd[1]: Started waagent.service. Mar 17 18:51:47.281054 systemd[1]: issuegen.service: Deactivated successfully. Mar 17 18:51:47.281245 systemd[1]: Finished issuegen.service. Mar 17 18:51:47.287126 systemd[1]: Starting systemd-user-sessions.service... Mar 17 18:51:47.307651 systemd[1]: Finished systemd-user-sessions.service. Mar 17 18:51:47.315415 systemd[1]: Started getty@tty1.service. Mar 17 18:51:47.322114 systemd[1]: Started serial-getty@ttyAMA0.service. Mar 17 18:51:47.327317 systemd[1]: Reached target getty.target. Mar 17 18:51:47.332199 systemd[1]: Reached target multi-user.target. Mar 17 18:51:47.338887 systemd[1]: Starting systemd-update-utmp-runlevel.service... Mar 17 18:51:47.350254 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Mar 17 18:51:47.350431 systemd[1]: Finished systemd-update-utmp-runlevel.service. Mar 17 18:51:47.356491 systemd[1]: Startup finished in 741ms (kernel) + 12.157s (initrd) + 20.371s (userspace) = 33.271s. Mar 17 18:51:47.788947 locksmithd[1548]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Mar 17 18:51:47.947080 login[1574]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Mar 17 18:51:47.960974 login[1573]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Mar 17 18:51:48.027920 systemd[1]: Created slice user-500.slice. Mar 17 18:51:48.029216 systemd[1]: Starting user-runtime-dir@500.service... Mar 17 18:51:48.031944 systemd-logind[1459]: New session 1 of user core. Mar 17 18:51:48.052790 systemd[1]: Finished user-runtime-dir@500.service. Mar 17 18:51:48.054698 systemd[1]: Starting user@500.service... Mar 17 18:51:48.075075 (systemd)[1578]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:51:48.262583 systemd[1578]: Queued start job for default target default.target. Mar 17 18:51:48.263119 systemd[1578]: Reached target paths.target. Mar 17 18:51:48.263139 systemd[1578]: Reached target sockets.target. Mar 17 18:51:48.263151 systemd[1578]: Reached target timers.target. Mar 17 18:51:48.263161 systemd[1578]: Reached target basic.target. Mar 17 18:51:48.263207 systemd[1578]: Reached target default.target. Mar 17 18:51:48.263231 systemd[1578]: Startup finished in 181ms. Mar 17 18:51:48.263346 systemd[1]: Started user@500.service. Mar 17 18:51:48.264397 systemd[1]: Started session-1.scope. Mar 17 18:51:48.948526 login[1574]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Mar 17 18:51:48.952502 systemd-logind[1459]: New session 2 of user core. Mar 17 18:51:48.953017 systemd[1]: Started session-2.scope. Mar 17 18:51:52.136121 waagent[1569]: 2025-03-17T18:51:52.136004Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Mar 17 18:51:52.173938 waagent[1569]: 2025-03-17T18:51:52.173832Z INFO Daemon Daemon OS: flatcar 3510.3.7 Mar 17 18:51:52.178986 waagent[1569]: 2025-03-17T18:51:52.178888Z INFO Daemon Daemon Python: 3.9.16 Mar 17 18:51:52.184080 waagent[1569]: 2025-03-17T18:51:52.183983Z INFO Daemon Daemon Run daemon Mar 17 18:51:52.188874 waagent[1569]: 2025-03-17T18:51:52.188789Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.7' Mar 17 18:51:52.207658 waagent[1569]: 2025-03-17T18:51:52.207423Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Mar 17 18:51:52.226112 waagent[1569]: 2025-03-17T18:51:52.225963Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Mar 17 18:51:52.236842 waagent[1569]: 2025-03-17T18:51:52.236745Z INFO Daemon Daemon cloud-init is enabled: False Mar 17 18:51:52.242418 waagent[1569]: 2025-03-17T18:51:52.242319Z INFO Daemon Daemon Using waagent for provisioning Mar 17 18:51:52.249027 waagent[1569]: 2025-03-17T18:51:52.248941Z INFO Daemon Daemon Activate resource disk Mar 17 18:51:52.254207 waagent[1569]: 2025-03-17T18:51:52.254115Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Mar 17 18:51:52.270592 waagent[1569]: 2025-03-17T18:51:52.270495Z INFO Daemon Daemon Found device: None Mar 17 18:51:52.276279 waagent[1569]: 2025-03-17T18:51:52.276184Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Mar 17 18:51:52.285327 waagent[1569]: 2025-03-17T18:51:52.285233Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Mar 17 18:51:52.297880 waagent[1569]: 2025-03-17T18:51:52.297806Z INFO Daemon Daemon Clean protocol and wireserver endpoint Mar 17 18:51:52.303956 waagent[1569]: 2025-03-17T18:51:52.303863Z INFO Daemon Daemon Running default provisioning handler Mar 17 18:51:52.319515 waagent[1569]: 2025-03-17T18:51:52.319342Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Mar 17 18:51:52.335527 waagent[1569]: 2025-03-17T18:51:52.335357Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Mar 17 18:51:52.346205 waagent[1569]: 2025-03-17T18:51:52.346103Z INFO Daemon Daemon cloud-init is enabled: False Mar 17 18:51:52.351774 waagent[1569]: 2025-03-17T18:51:52.351674Z INFO Daemon Daemon Copying ovf-env.xml Mar 17 18:51:52.482418 waagent[1569]: 2025-03-17T18:51:52.482170Z INFO Daemon Daemon Successfully mounted dvd Mar 17 18:51:52.719696 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Mar 17 18:51:52.762635 waagent[1569]: 2025-03-17T18:51:52.762393Z INFO Daemon Daemon Detect protocol endpoint Mar 17 18:51:52.768492 waagent[1569]: 2025-03-17T18:51:52.768389Z INFO Daemon Daemon Clean protocol and wireserver endpoint Mar 17 18:51:52.775309 waagent[1569]: 2025-03-17T18:51:52.775226Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Mar 17 18:51:52.782929 waagent[1569]: 2025-03-17T18:51:52.782848Z INFO Daemon Daemon Test for route to 168.63.129.16 Mar 17 18:51:52.788965 waagent[1569]: 2025-03-17T18:51:52.788887Z INFO Daemon Daemon Route to 168.63.129.16 exists Mar 17 18:51:52.794819 waagent[1569]: 2025-03-17T18:51:52.794742Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Mar 17 18:51:52.918234 waagent[1569]: 2025-03-17T18:51:52.918156Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Mar 17 18:51:52.925858 waagent[1569]: 2025-03-17T18:51:52.925809Z INFO Daemon Daemon Wire protocol version:2012-11-30 Mar 17 18:51:52.931429 waagent[1569]: 2025-03-17T18:51:52.931352Z INFO Daemon Daemon Server preferred version:2015-04-05 Mar 17 18:51:54.598795 waagent[1569]: 2025-03-17T18:51:54.598613Z INFO Daemon Daemon Initializing goal state during protocol detection Mar 17 18:51:54.617727 waagent[1569]: 2025-03-17T18:51:54.617625Z INFO Daemon Daemon Forcing an update of the goal state.. Mar 17 18:51:54.623895 waagent[1569]: 2025-03-17T18:51:54.623810Z INFO Daemon Daemon Fetching goal state [incarnation 1] Mar 17 18:51:54.725260 waagent[1569]: 2025-03-17T18:51:54.725109Z INFO Daemon Daemon Found private key matching thumbprint 1F830CE72CF1D4E049AB7B7DEE544D9EB0757E59 Mar 17 18:51:54.734940 waagent[1569]: 2025-03-17T18:51:54.734848Z INFO Daemon Daemon Certificate with thumbprint 4D703A5481A7B9F739A5AFAED984794E394CF4FE has no matching private key. Mar 17 18:51:54.745667 waagent[1569]: 2025-03-17T18:51:54.745584Z INFO Daemon Daemon Fetch goal state completed Mar 17 18:51:54.822626 waagent[1569]: 2025-03-17T18:51:54.822562Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: c6b9b612-ec71-4c7e-9472-f589daca7f15 New eTag: 3613659901894989237] Mar 17 18:51:54.835208 waagent[1569]: 2025-03-17T18:51:54.835122Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Mar 17 18:51:54.852327 waagent[1569]: 2025-03-17T18:51:54.852231Z INFO Daemon Daemon Starting provisioning Mar 17 18:51:54.857627 waagent[1569]: 2025-03-17T18:51:54.857536Z INFO Daemon Daemon Handle ovf-env.xml. Mar 17 18:51:54.862844 waagent[1569]: 2025-03-17T18:51:54.862761Z INFO Daemon Daemon Set hostname [ci-3510.3.7-a-78f2e87fa3] Mar 17 18:51:54.899931 waagent[1569]: 2025-03-17T18:51:54.899772Z INFO Daemon Daemon Publish hostname [ci-3510.3.7-a-78f2e87fa3] Mar 17 18:51:54.906548 waagent[1569]: 2025-03-17T18:51:54.906441Z INFO Daemon Daemon Examine /proc/net/route for primary interface Mar 17 18:51:54.913705 waagent[1569]: 2025-03-17T18:51:54.913623Z INFO Daemon Daemon Primary interface is [eth0] Mar 17 18:51:54.931130 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Mar 17 18:51:54.931311 systemd[1]: Stopped systemd-networkd-wait-online.service. Mar 17 18:51:54.931374 systemd[1]: Stopping systemd-networkd-wait-online.service... Mar 17 18:51:54.931673 systemd[1]: Stopping systemd-networkd.service... Mar 17 18:51:54.935508 systemd-networkd[1244]: eth0: DHCPv6 lease lost Mar 17 18:51:54.937368 systemd[1]: systemd-networkd.service: Deactivated successfully. Mar 17 18:51:54.937565 systemd[1]: Stopped systemd-networkd.service. Mar 17 18:51:54.939788 systemd[1]: Starting systemd-networkd.service... Mar 17 18:51:54.969155 systemd-networkd[1622]: enP6442s1: Link UP Mar 17 18:51:54.969166 systemd-networkd[1622]: enP6442s1: Gained carrier Mar 17 18:51:54.970079 systemd-networkd[1622]: eth0: Link UP Mar 17 18:51:54.970089 systemd-networkd[1622]: eth0: Gained carrier Mar 17 18:51:54.970404 systemd-networkd[1622]: lo: Link UP Mar 17 18:51:54.970414 systemd-networkd[1622]: lo: Gained carrier Mar 17 18:51:54.970969 systemd-networkd[1622]: eth0: Gained IPv6LL Mar 17 18:51:54.972131 systemd-networkd[1622]: Enumeration completed Mar 17 18:51:54.972266 systemd[1]: Started systemd-networkd.service. Mar 17 18:51:54.973994 systemd-networkd[1622]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Mar 17 18:51:54.974159 systemd[1]: Starting systemd-networkd-wait-online.service... Mar 17 18:51:54.976149 waagent[1569]: 2025-03-17T18:51:54.975755Z INFO Daemon Daemon Create user account if not exists Mar 17 18:51:54.983219 waagent[1569]: 2025-03-17T18:51:54.983120Z INFO Daemon Daemon User core already exists, skip useradd Mar 17 18:51:54.990669 waagent[1569]: 2025-03-17T18:51:54.990557Z INFO Daemon Daemon Configure sudoer Mar 17 18:51:54.991539 systemd-networkd[1622]: eth0: DHCPv4 address 10.200.20.21/24, gateway 10.200.20.1 acquired from 168.63.129.16 Mar 17 18:51:54.996316 systemd[1]: Finished systemd-networkd-wait-online.service. Mar 17 18:51:54.996880 waagent[1569]: 2025-03-17T18:51:54.996795Z INFO Daemon Daemon Configure sshd Mar 17 18:51:55.001331 waagent[1569]: 2025-03-17T18:51:55.001240Z INFO Daemon Daemon Deploy ssh public key. Mar 17 18:51:56.180083 waagent[1569]: 2025-03-17T18:51:56.180001Z INFO Daemon Daemon Provisioning complete Mar 17 18:51:56.199555 waagent[1569]: 2025-03-17T18:51:56.199478Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Mar 17 18:51:56.207249 waagent[1569]: 2025-03-17T18:51:56.207149Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Mar 17 18:51:56.218846 waagent[1569]: 2025-03-17T18:51:56.218751Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Mar 17 18:51:56.541153 waagent[1631]: 2025-03-17T18:51:56.541004Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Mar 17 18:51:56.541914 waagent[1631]: 2025-03-17T18:51:56.541848Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Mar 17 18:51:56.542047 waagent[1631]: 2025-03-17T18:51:56.542002Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Mar 17 18:51:56.555327 waagent[1631]: 2025-03-17T18:51:56.555212Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Mar 17 18:51:56.555560 waagent[1631]: 2025-03-17T18:51:56.555509Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Mar 17 18:51:56.630888 waagent[1631]: 2025-03-17T18:51:56.630733Z INFO ExtHandler ExtHandler Found private key matching thumbprint 1F830CE72CF1D4E049AB7B7DEE544D9EB0757E59 Mar 17 18:51:56.631116 waagent[1631]: 2025-03-17T18:51:56.631063Z INFO ExtHandler ExtHandler Certificate with thumbprint 4D703A5481A7B9F739A5AFAED984794E394CF4FE has no matching private key. Mar 17 18:51:56.631349 waagent[1631]: 2025-03-17T18:51:56.631301Z INFO ExtHandler ExtHandler Fetch goal state completed Mar 17 18:51:56.647499 waagent[1631]: 2025-03-17T18:51:56.647408Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: fc92fc3e-7771-4d6c-9902-447f1446afb0 New eTag: 3613659901894989237] Mar 17 18:51:56.648174 waagent[1631]: 2025-03-17T18:51:56.648106Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Mar 17 18:51:56.709383 waagent[1631]: 2025-03-17T18:51:56.709226Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Mar 17 18:51:56.719963 waagent[1631]: 2025-03-17T18:51:56.719876Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1631 Mar 17 18:51:56.723899 waagent[1631]: 2025-03-17T18:51:56.723814Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] Mar 17 18:51:56.725294 waagent[1631]: 2025-03-17T18:51:56.725220Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Mar 17 18:51:56.883197 waagent[1631]: 2025-03-17T18:51:56.883069Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Mar 17 18:51:56.883638 waagent[1631]: 2025-03-17T18:51:56.883576Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Mar 17 18:51:56.892136 waagent[1631]: 2025-03-17T18:51:56.892067Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Mar 17 18:51:56.892778 waagent[1631]: 2025-03-17T18:51:56.892714Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Mar 17 18:51:56.894032 waagent[1631]: 2025-03-17T18:51:56.893965Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Mar 17 18:51:56.895515 waagent[1631]: 2025-03-17T18:51:56.895418Z INFO ExtHandler ExtHandler Starting env monitor service. Mar 17 18:51:56.896206 waagent[1631]: 2025-03-17T18:51:56.896143Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Mar 17 18:51:56.896496 waagent[1631]: 2025-03-17T18:51:56.896423Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Mar 17 18:51:56.897192 waagent[1631]: 2025-03-17T18:51:56.897135Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Mar 17 18:51:56.897604 waagent[1631]: 2025-03-17T18:51:56.897550Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Mar 17 18:51:56.897604 waagent[1631]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Mar 17 18:51:56.897604 waagent[1631]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Mar 17 18:51:56.897604 waagent[1631]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Mar 17 18:51:56.897604 waagent[1631]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Mar 17 18:51:56.897604 waagent[1631]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Mar 17 18:51:56.897604 waagent[1631]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Mar 17 18:51:56.900345 waagent[1631]: 2025-03-17T18:51:56.900131Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Mar 17 18:51:56.900789 waagent[1631]: 2025-03-17T18:51:56.900710Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Mar 17 18:51:56.901860 waagent[1631]: 2025-03-17T18:51:56.901780Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Mar 17 18:51:56.902589 waagent[1631]: 2025-03-17T18:51:56.902506Z INFO EnvHandler ExtHandler Configure routes Mar 17 18:51:56.902807 waagent[1631]: 2025-03-17T18:51:56.902740Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Mar 17 18:51:56.903061 waagent[1631]: 2025-03-17T18:51:56.902987Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Mar 17 18:51:56.903151 waagent[1631]: 2025-03-17T18:51:56.903096Z INFO EnvHandler ExtHandler Gateway:None Mar 17 18:51:56.903362 waagent[1631]: 2025-03-17T18:51:56.903304Z INFO EnvHandler ExtHandler Routes:None Mar 17 18:51:56.904402 waagent[1631]: 2025-03-17T18:51:56.904155Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Mar 17 18:51:56.904614 waagent[1631]: 2025-03-17T18:51:56.904537Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Mar 17 18:51:56.906015 waagent[1631]: 2025-03-17T18:51:56.905947Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Mar 17 18:51:56.919112 waagent[1631]: 2025-03-17T18:51:56.919034Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Mar 17 18:51:56.919957 waagent[1631]: 2025-03-17T18:51:56.919906Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Mar 17 18:51:56.921078 waagent[1631]: 2025-03-17T18:51:56.921019Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Mar 17 18:51:56.960365 waagent[1631]: 2025-03-17T18:51:56.960228Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1622' Mar 17 18:51:56.973209 waagent[1631]: 2025-03-17T18:51:56.973139Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Mar 17 18:51:57.044000 waagent[1631]: 2025-03-17T18:51:57.043839Z INFO MonitorHandler ExtHandler Network interfaces: Mar 17 18:51:57.044000 waagent[1631]: Executing ['ip', '-a', '-o', 'link']: Mar 17 18:51:57.044000 waagent[1631]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Mar 17 18:51:57.044000 waagent[1631]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b8:bf:b2 brd ff:ff:ff:ff:ff:ff Mar 17 18:51:57.044000 waagent[1631]: 3: enP6442s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b8:bf:b2 brd ff:ff:ff:ff:ff:ff\ altname enP6442p0s2 Mar 17 18:51:57.044000 waagent[1631]: Executing ['ip', '-4', '-a', '-o', 'address']: Mar 17 18:51:57.044000 waagent[1631]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Mar 17 18:51:57.044000 waagent[1631]: 2: eth0 inet 10.200.20.21/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Mar 17 18:51:57.044000 waagent[1631]: Executing ['ip', '-6', '-a', '-o', 'address']: Mar 17 18:51:57.044000 waagent[1631]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Mar 17 18:51:57.044000 waagent[1631]: 2: eth0 inet6 fe80::222:48ff:feb8:bfb2/64 scope link \ valid_lft forever preferred_lft forever Mar 17 18:51:57.225437 waagent[1631]: 2025-03-17T18:51:57.225306Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.12.0.2 -- exiting Mar 17 18:51:57.288596 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Mar 17 18:51:57.288773 systemd[1]: Stopped kubelet.service. Mar 17 18:51:57.290291 systemd[1]: Starting kubelet.service... Mar 17 18:51:57.378938 systemd[1]: Started kubelet.service. Mar 17 18:51:57.434945 kubelet[1664]: E0317 18:51:57.434901 1664 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 18:51:57.437584 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 18:51:57.437725 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 18:51:58.224492 waagent[1569]: 2025-03-17T18:51:58.223727Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Mar 17 18:51:58.228691 waagent[1569]: 2025-03-17T18:51:58.228634Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.12.0.2 to be the latest agent Mar 17 18:51:59.539696 waagent[1672]: 2025-03-17T18:51:59.539585Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.12.0.2) Mar 17 18:51:59.540458 waagent[1672]: 2025-03-17T18:51:59.540380Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.7 Mar 17 18:51:59.540631 waagent[1672]: 2025-03-17T18:51:59.540579Z INFO ExtHandler ExtHandler Python: 3.9.16 Mar 17 18:51:59.540759 waagent[1672]: 2025-03-17T18:51:59.540714Z INFO ExtHandler ExtHandler CPU Arch: aarch64 Mar 17 18:51:59.549816 waagent[1672]: 2025-03-17T18:51:59.549667Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.7; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: aarch64; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Mar 17 18:51:59.550297 waagent[1672]: 2025-03-17T18:51:59.550236Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Mar 17 18:51:59.550462 waagent[1672]: 2025-03-17T18:51:59.550411Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Mar 17 18:51:59.565459 waagent[1672]: 2025-03-17T18:51:59.565346Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Mar 17 18:51:59.583180 waagent[1672]: 2025-03-17T18:51:59.583116Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.164 Mar 17 18:51:59.584350 waagent[1672]: 2025-03-17T18:51:59.584285Z INFO ExtHandler Mar 17 18:51:59.584524 waagent[1672]: 2025-03-17T18:51:59.584476Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 1dff91e4-dd47-4ac1-8afc-603ec4e3a24d eTag: 3613659901894989237 source: Fabric] Mar 17 18:51:59.585282 waagent[1672]: 2025-03-17T18:51:59.585224Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Mar 17 18:51:59.586547 waagent[1672]: 2025-03-17T18:51:59.586488Z INFO ExtHandler Mar 17 18:51:59.586679 waagent[1672]: 2025-03-17T18:51:59.586634Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Mar 17 18:51:59.594679 waagent[1672]: 2025-03-17T18:51:59.594624Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Mar 17 18:51:59.595237 waagent[1672]: 2025-03-17T18:51:59.595188Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Mar 17 18:51:59.618049 waagent[1672]: 2025-03-17T18:51:59.617989Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Mar 17 18:51:59.707155 waagent[1672]: 2025-03-17T18:51:59.706949Z INFO ExtHandler Downloaded certificate {'thumbprint': '4D703A5481A7B9F739A5AFAED984794E394CF4FE', 'hasPrivateKey': False} Mar 17 18:51:59.708688 waagent[1672]: 2025-03-17T18:51:59.708574Z INFO ExtHandler Downloaded certificate {'thumbprint': '1F830CE72CF1D4E049AB7B7DEE544D9EB0757E59', 'hasPrivateKey': True} Mar 17 18:51:59.710139 waagent[1672]: 2025-03-17T18:51:59.710046Z INFO ExtHandler Fetch goal state completed Mar 17 18:51:59.732677 waagent[1672]: 2025-03-17T18:51:59.732503Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) Mar 17 18:51:59.749865 waagent[1672]: 2025-03-17T18:51:59.749744Z INFO ExtHandler ExtHandler WALinuxAgent-2.12.0.2 running as process 1672 Mar 17 18:51:59.754398 waagent[1672]: 2025-03-17T18:51:59.754312Z INFO ExtHandler ExtHandler [CGI] Cgroup monitoring is not supported on ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] Mar 17 18:51:59.755974 waagent[1672]: 2025-03-17T18:51:59.755908Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case distro: ['flatcar', '3510.3.7', '', 'Flatcar Container Linux by Kinvolk'] went from supported to unsupported Mar 17 18:51:59.756400 waagent[1672]: 2025-03-17T18:51:59.756346Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False Mar 17 18:51:59.759327 waagent[1672]: 2025-03-17T18:51:59.759251Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Mar 17 18:51:59.766966 waagent[1672]: 2025-03-17T18:51:59.766894Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Mar 17 18:51:59.767644 waagent[1672]: 2025-03-17T18:51:59.767577Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Mar 17 18:51:59.778813 waagent[1672]: 2025-03-17T18:51:59.778715Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Mar 17 18:51:59.779802 waagent[1672]: 2025-03-17T18:51:59.779699Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Mar 17 18:51:59.789250 waagent[1672]: 2025-03-17T18:51:59.789081Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Mar 17 18:51:59.791096 waagent[1672]: 2025-03-17T18:51:59.790904Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] Mar 17 18:51:59.793616 waagent[1672]: 2025-03-17T18:51:59.793533Z INFO ExtHandler ExtHandler Starting env monitor service. Mar 17 18:51:59.794021 waagent[1672]: 2025-03-17T18:51:59.793914Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Mar 17 18:51:59.794825 waagent[1672]: 2025-03-17T18:51:59.794753Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Mar 17 18:51:59.795833 waagent[1672]: 2025-03-17T18:51:59.795719Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Mar 17 18:51:59.796492 waagent[1672]: 2025-03-17T18:51:59.796399Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Mar 17 18:51:59.797940 waagent[1672]: 2025-03-17T18:51:59.797859Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Mar 17 18:51:59.797940 waagent[1672]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Mar 17 18:51:59.797940 waagent[1672]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Mar 17 18:51:59.797940 waagent[1672]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Mar 17 18:51:59.797940 waagent[1672]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Mar 17 18:51:59.797940 waagent[1672]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Mar 17 18:51:59.797940 waagent[1672]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Mar 17 18:51:59.797940 waagent[1672]: 2025-03-17T18:51:59.797757Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Mar 17 18:51:59.798503 waagent[1672]: 2025-03-17T18:51:59.798410Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Mar 17 18:51:59.799289 waagent[1672]: 2025-03-17T18:51:59.799180Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Mar 17 18:51:59.800127 waagent[1672]: 2025-03-17T18:51:59.800021Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Mar 17 18:51:59.803320 waagent[1672]: 2025-03-17T18:51:59.803135Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Mar 17 18:51:59.803895 waagent[1672]: 2025-03-17T18:51:59.803819Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Mar 17 18:51:59.804847 waagent[1672]: 2025-03-17T18:51:59.804768Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Mar 17 18:51:59.807998 waagent[1672]: 2025-03-17T18:51:59.807883Z INFO EnvHandler ExtHandler Configure routes Mar 17 18:51:59.809230 waagent[1672]: 2025-03-17T18:51:59.809122Z INFO EnvHandler ExtHandler Gateway:None Mar 17 18:51:59.812753 waagent[1672]: 2025-03-17T18:51:59.812638Z INFO EnvHandler ExtHandler Routes:None Mar 17 18:51:59.828933 waagent[1672]: 2025-03-17T18:51:59.828837Z INFO ExtHandler ExtHandler Downloading agent manifest Mar 17 18:51:59.830882 waagent[1672]: 2025-03-17T18:51:59.830744Z INFO MonitorHandler ExtHandler Network interfaces: Mar 17 18:51:59.830882 waagent[1672]: Executing ['ip', '-a', '-o', 'link']: Mar 17 18:51:59.830882 waagent[1672]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Mar 17 18:51:59.830882 waagent[1672]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b8:bf:b2 brd ff:ff:ff:ff:ff:ff Mar 17 18:51:59.830882 waagent[1672]: 3: enP6442s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b8:bf:b2 brd ff:ff:ff:ff:ff:ff\ altname enP6442p0s2 Mar 17 18:51:59.830882 waagent[1672]: Executing ['ip', '-4', '-a', '-o', 'address']: Mar 17 18:51:59.830882 waagent[1672]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Mar 17 18:51:59.830882 waagent[1672]: 2: eth0 inet 10.200.20.21/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Mar 17 18:51:59.830882 waagent[1672]: Executing ['ip', '-6', '-a', '-o', 'address']: Mar 17 18:51:59.830882 waagent[1672]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Mar 17 18:51:59.830882 waagent[1672]: 2: eth0 inet6 fe80::222:48ff:feb8:bfb2/64 scope link \ valid_lft forever preferred_lft forever Mar 17 18:51:59.844141 waagent[1672]: 2025-03-17T18:51:59.844050Z INFO ExtHandler ExtHandler Mar 17 18:51:59.845998 waagent[1672]: 2025-03-17T18:51:59.845912Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: f7a21c34-0e1c-43a9-be05-34c610609e25 correlation 4e5c7bca-63b5-4c27-a072-3bd187617a49 created: 2025-03-17T18:50:30.879669Z] Mar 17 18:51:59.850526 waagent[1672]: 2025-03-17T18:51:59.850402Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Mar 17 18:51:59.856181 waagent[1672]: 2025-03-17T18:51:59.856098Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 12 ms] Mar 17 18:51:59.883311 waagent[1672]: 2025-03-17T18:51:59.883239Z INFO ExtHandler ExtHandler Looking for existing remote access users. Mar 17 18:51:59.920792 waagent[1672]: 2025-03-17T18:51:59.920529Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.12.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 0237C30A-62EF-4259-9942-CF6EB7457EAE;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] Mar 17 18:52:00.162410 waagent[1672]: 2025-03-17T18:52:00.162181Z INFO EnvHandler ExtHandler Created firewall rules for the Azure Fabric: Mar 17 18:52:00.162410 waagent[1672]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Mar 17 18:52:00.162410 waagent[1672]: pkts bytes target prot opt in out source destination Mar 17 18:52:00.162410 waagent[1672]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Mar 17 18:52:00.162410 waagent[1672]: pkts bytes target prot opt in out source destination Mar 17 18:52:00.162410 waagent[1672]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Mar 17 18:52:00.162410 waagent[1672]: pkts bytes target prot opt in out source destination Mar 17 18:52:00.162410 waagent[1672]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Mar 17 18:52:00.162410 waagent[1672]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Mar 17 18:52:00.162410 waagent[1672]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Mar 17 18:52:00.172201 waagent[1672]: 2025-03-17T18:52:00.172040Z INFO EnvHandler ExtHandler Current Firewall rules: Mar 17 18:52:00.172201 waagent[1672]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Mar 17 18:52:00.172201 waagent[1672]: pkts bytes target prot opt in out source destination Mar 17 18:52:00.172201 waagent[1672]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Mar 17 18:52:00.172201 waagent[1672]: pkts bytes target prot opt in out source destination Mar 17 18:52:00.172201 waagent[1672]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Mar 17 18:52:00.172201 waagent[1672]: pkts bytes target prot opt in out source destination Mar 17 18:52:00.172201 waagent[1672]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Mar 17 18:52:00.172201 waagent[1672]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Mar 17 18:52:00.172201 waagent[1672]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Mar 17 18:52:00.172829 waagent[1672]: 2025-03-17T18:52:00.172776Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Mar 17 18:52:07.441183 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Mar 17 18:52:07.441374 systemd[1]: Stopped kubelet.service. Mar 17 18:52:07.442868 systemd[1]: Starting kubelet.service... Mar 17 18:52:07.672731 systemd[1]: Started kubelet.service. Mar 17 18:52:07.709278 kubelet[1727]: E0317 18:52:07.709147 1727 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 18:52:07.711306 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 18:52:07.711431 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 18:52:17.941384 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Mar 17 18:52:17.941671 systemd[1]: Stopped kubelet.service. Mar 17 18:52:17.943682 systemd[1]: Starting kubelet.service... Mar 17 18:52:18.168171 systemd[1]: Started kubelet.service. Mar 17 18:52:18.202493 kubelet[1736]: E0317 18:52:18.202367 1736 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 18:52:18.204549 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 18:52:18.204673 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 18:52:26.163826 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Mar 17 18:52:28.441164 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Mar 17 18:52:28.441342 systemd[1]: Stopped kubelet.service. Mar 17 18:52:28.442756 systemd[1]: Starting kubelet.service... Mar 17 18:52:28.613027 systemd[1]: Started kubelet.service. Mar 17 18:52:28.645364 kubelet[1745]: E0317 18:52:28.645294 1745 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 18:52:28.647331 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 18:52:28.647473 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 18:52:32.123492 update_engine[1464]: I0317 18:52:32.123407 1464 update_attempter.cc:509] Updating boot flags... Mar 17 18:52:38.353662 systemd[1]: Created slice system-sshd.slice. Mar 17 18:52:38.355260 systemd[1]: Started sshd@0-10.200.20.21:22-10.200.16.10:42030.service. Mar 17 18:52:38.691160 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Mar 17 18:52:38.691337 systemd[1]: Stopped kubelet.service. Mar 17 18:52:38.692810 systemd[1]: Starting kubelet.service... Mar 17 18:52:38.938201 sshd[1793]: Accepted publickey for core from 10.200.16.10 port 42030 ssh2: RSA SHA256:paJy8VmUDtRyOvFhLDJavsN2rbrMSHSIk56mCEIjqlY Mar 17 18:52:38.977753 systemd[1]: Started kubelet.service. Mar 17 18:52:39.009184 kubelet[1799]: E0317 18:52:39.009125 1799 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Mar 17 18:52:39.010790 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Mar 17 18:52:39.010915 systemd[1]: kubelet.service: Failed with result 'exit-code'. Mar 17 18:52:39.030421 sshd[1793]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:52:39.034482 systemd[1]: Started session-3.scope. Mar 17 18:52:39.035509 systemd-logind[1459]: New session 3 of user core. Mar 17 18:52:39.372265 systemd[1]: Started sshd@1-10.200.20.21:22-10.200.16.10:42044.service. Mar 17 18:52:39.805179 sshd[1807]: Accepted publickey for core from 10.200.16.10 port 42044 ssh2: RSA SHA256:paJy8VmUDtRyOvFhLDJavsN2rbrMSHSIk56mCEIjqlY Mar 17 18:52:39.806806 sshd[1807]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:52:39.811387 systemd[1]: Started session-4.scope. Mar 17 18:52:39.811688 systemd-logind[1459]: New session 4 of user core. Mar 17 18:52:40.138041 sshd[1807]: pam_unix(sshd:session): session closed for user core Mar 17 18:52:40.140415 systemd[1]: sshd@1-10.200.20.21:22-10.200.16.10:42044.service: Deactivated successfully. Mar 17 18:52:40.141121 systemd[1]: session-4.scope: Deactivated successfully. Mar 17 18:52:40.141669 systemd-logind[1459]: Session 4 logged out. Waiting for processes to exit. Mar 17 18:52:40.142653 systemd-logind[1459]: Removed session 4. Mar 17 18:52:40.215985 systemd[1]: Started sshd@2-10.200.20.21:22-10.200.16.10:42054.service. Mar 17 18:52:40.686466 sshd[1813]: Accepted publickey for core from 10.200.16.10 port 42054 ssh2: RSA SHA256:paJy8VmUDtRyOvFhLDJavsN2rbrMSHSIk56mCEIjqlY Mar 17 18:52:40.687752 sshd[1813]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:52:40.692076 systemd[1]: Started session-5.scope. Mar 17 18:52:40.692512 systemd-logind[1459]: New session 5 of user core. Mar 17 18:52:41.022224 sshd[1813]: pam_unix(sshd:session): session closed for user core Mar 17 18:52:41.024723 systemd[1]: sshd@2-10.200.20.21:22-10.200.16.10:42054.service: Deactivated successfully. Mar 17 18:52:41.025422 systemd[1]: session-5.scope: Deactivated successfully. Mar 17 18:52:41.025970 systemd-logind[1459]: Session 5 logged out. Waiting for processes to exit. Mar 17 18:52:41.026814 systemd-logind[1459]: Removed session 5. Mar 17 18:52:41.094095 systemd[1]: Started sshd@3-10.200.20.21:22-10.200.16.10:42062.service. Mar 17 18:52:41.528808 sshd[1819]: Accepted publickey for core from 10.200.16.10 port 42062 ssh2: RSA SHA256:paJy8VmUDtRyOvFhLDJavsN2rbrMSHSIk56mCEIjqlY Mar 17 18:52:41.530062 sshd[1819]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:52:41.533869 systemd-logind[1459]: New session 6 of user core. Mar 17 18:52:41.534307 systemd[1]: Started session-6.scope. Mar 17 18:52:41.861924 sshd[1819]: pam_unix(sshd:session): session closed for user core Mar 17 18:52:41.864701 systemd[1]: sshd@3-10.200.20.21:22-10.200.16.10:42062.service: Deactivated successfully. Mar 17 18:52:41.865355 systemd[1]: session-6.scope: Deactivated successfully. Mar 17 18:52:41.865906 systemd-logind[1459]: Session 6 logged out. Waiting for processes to exit. Mar 17 18:52:41.866742 systemd-logind[1459]: Removed session 6. Mar 17 18:52:41.940190 systemd[1]: Started sshd@4-10.200.20.21:22-10.200.16.10:42074.service. Mar 17 18:52:42.411111 sshd[1825]: Accepted publickey for core from 10.200.16.10 port 42074 ssh2: RSA SHA256:paJy8VmUDtRyOvFhLDJavsN2rbrMSHSIk56mCEIjqlY Mar 17 18:52:42.412385 sshd[1825]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:52:42.416372 systemd-logind[1459]: New session 7 of user core. Mar 17 18:52:42.416866 systemd[1]: Started session-7.scope. Mar 17 18:52:42.877252 sudo[1828]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Mar 17 18:52:42.877490 sudo[1828]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 18:52:42.917606 dbus-daemon[1448]: avc: received setenforce notice (enforcing=1) Mar 17 18:52:42.918538 sudo[1828]: pam_unix(sudo:session): session closed for user root Mar 17 18:52:43.022894 sshd[1825]: pam_unix(sshd:session): session closed for user core Mar 17 18:52:43.025873 systemd[1]: sshd@4-10.200.20.21:22-10.200.16.10:42074.service: Deactivated successfully. Mar 17 18:52:43.026696 systemd[1]: session-7.scope: Deactivated successfully. Mar 17 18:52:43.027302 systemd-logind[1459]: Session 7 logged out. Waiting for processes to exit. Mar 17 18:52:43.028236 systemd-logind[1459]: Removed session 7. Mar 17 18:52:43.095320 systemd[1]: Started sshd@5-10.200.20.21:22-10.200.16.10:42076.service. Mar 17 18:52:43.529048 sshd[1832]: Accepted publickey for core from 10.200.16.10 port 42076 ssh2: RSA SHA256:paJy8VmUDtRyOvFhLDJavsN2rbrMSHSIk56mCEIjqlY Mar 17 18:52:43.530811 sshd[1832]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:52:43.535269 systemd[1]: Started session-8.scope. Mar 17 18:52:43.535900 systemd-logind[1459]: New session 8 of user core. Mar 17 18:52:43.777370 sudo[1836]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Mar 17 18:52:43.777918 sudo[1836]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 18:52:43.780719 sudo[1836]: pam_unix(sudo:session): session closed for user root Mar 17 18:52:43.785838 sudo[1835]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Mar 17 18:52:43.786050 sudo[1835]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 18:52:43.794847 systemd[1]: Stopping audit-rules.service... Mar 17 18:52:43.794000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Mar 17 18:52:43.808649 auditctl[1839]: No rules Mar 17 18:52:43.794000 audit[1839]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffda232170 a2=420 a3=0 items=0 ppid=1 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:43.809354 systemd[1]: audit-rules.service: Deactivated successfully. Mar 17 18:52:43.809559 systemd[1]: Stopped audit-rules.service. Mar 17 18:52:43.814672 systemd[1]: Starting audit-rules.service... Mar 17 18:52:43.834164 augenrules[1856]: No rules Mar 17 18:52:43.836462 kernel: audit: type=1305 audit(1742237563.794:217): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Mar 17 18:52:43.836566 kernel: audit: type=1300 audit(1742237563.794:217): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffda232170 a2=420 a3=0 items=0 ppid=1 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:43.835259 systemd[1]: Finished audit-rules.service. Mar 17 18:52:43.836498 sudo[1835]: pam_unix(sudo:session): session closed for user root Mar 17 18:52:43.794000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Mar 17 18:52:43.844480 kernel: audit: type=1327 audit(1742237563.794:217): proctitle=2F7362696E2F617564697463746C002D44 Mar 17 18:52:43.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:43.860898 kernel: audit: type=1131 audit(1742237563.808:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:43.861036 kernel: audit: type=1130 audit(1742237563.834:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:43.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:43.835000 audit[1835]: USER_END pid=1835 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:52:43.896820 kernel: audit: type=1106 audit(1742237563.835:220): pid=1835 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:52:43.835000 audit[1835]: CRED_DISP pid=1835 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:52:43.913742 kernel: audit: type=1104 audit(1742237563.835:221): pid=1835 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:52:43.930592 sshd[1832]: pam_unix(sshd:session): session closed for user core Mar 17 18:52:43.930000 audit[1832]: USER_END pid=1832 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:43.955723 systemd[1]: sshd@5-10.200.20.21:22-10.200.16.10:42076.service: Deactivated successfully. Mar 17 18:52:43.930000 audit[1832]: CRED_DISP pid=1832 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:43.976896 kernel: audit: type=1106 audit(1742237563.930:222): pid=1832 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:43.977001 kernel: audit: type=1104 audit(1742237563.930:223): pid=1832 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:43.956473 systemd[1]: session-8.scope: Deactivated successfully. Mar 17 18:52:43.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.21:22-10.200.16.10:42076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:43.995018 kernel: audit: type=1131 audit(1742237563.954:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.21:22-10.200.16.10:42076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:43.995171 systemd-logind[1459]: Session 8 logged out. Waiting for processes to exit. Mar 17 18:52:43.996135 systemd-logind[1459]: Removed session 8. Mar 17 18:52:44.001230 systemd[1]: Started sshd@6-10.200.20.21:22-10.200.16.10:42086.service. Mar 17 18:52:43.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.21:22-10.200.16.10:42086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:44.433000 audit[1862]: USER_ACCT pid=1862 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:44.434882 sshd[1862]: Accepted publickey for core from 10.200.16.10 port 42086 ssh2: RSA SHA256:paJy8VmUDtRyOvFhLDJavsN2rbrMSHSIk56mCEIjqlY Mar 17 18:52:44.434000 audit[1862]: CRED_ACQ pid=1862 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:44.434000 audit[1862]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd17a1b60 a2=3 a3=1 items=0 ppid=1 pid=1862 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:44.434000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Mar 17 18:52:44.436434 sshd[1862]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Mar 17 18:52:44.440331 systemd-logind[1459]: New session 9 of user core. Mar 17 18:52:44.440818 systemd[1]: Started session-9.scope. Mar 17 18:52:44.443000 audit[1862]: USER_START pid=1862 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:44.444000 audit[1864]: CRED_ACQ pid=1864 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:44.680000 audit[1865]: USER_ACCT pid=1865 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:52:44.680000 audit[1865]: CRED_REFR pid=1865 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:52:44.681696 sudo[1865]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Mar 17 18:52:44.682298 sudo[1865]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Mar 17 18:52:44.682000 audit[1865]: USER_START pid=1865 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:52:44.694294 systemd[1]: Starting coreos-metadata.service... Mar 17 18:52:44.755062 coreos-metadata[1869]: Mar 17 18:52:44.754 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Mar 17 18:52:44.758052 coreos-metadata[1869]: Mar 17 18:52:44.757 INFO Fetch successful Mar 17 18:52:44.758240 coreos-metadata[1869]: Mar 17 18:52:44.758 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Mar 17 18:52:44.760043 coreos-metadata[1869]: Mar 17 18:52:44.759 INFO Fetch successful Mar 17 18:52:44.760374 coreos-metadata[1869]: Mar 17 18:52:44.760 INFO Fetching http://168.63.129.16/machine/17e56249-7abb-4476-9b2d-0d456017c35f/898fe666%2De2c4%2D4bbb%2Dbae3%2D9932859c4880.%5Fci%2D3510.3.7%2Da%2D78f2e87fa3?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Mar 17 18:52:44.762557 coreos-metadata[1869]: Mar 17 18:52:44.762 INFO Fetch successful Mar 17 18:52:44.796392 coreos-metadata[1869]: Mar 17 18:52:44.796 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Mar 17 18:52:44.811152 coreos-metadata[1869]: Mar 17 18:52:44.810 INFO Fetch successful Mar 17 18:52:44.819757 systemd[1]: Finished coreos-metadata.service. Mar 17 18:52:44.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:45.251045 systemd[1]: Stopped kubelet.service. Mar 17 18:52:45.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:45.249000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:45.253792 systemd[1]: Starting kubelet.service... Mar 17 18:52:45.280217 systemd[1]: Reloading. Mar 17 18:52:45.353792 /usr/lib/systemd/system-generators/torcx-generator[1924]: time="2025-03-17T18:52:45Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" Mar 17 18:52:45.354145 /usr/lib/systemd/system-generators/torcx-generator[1924]: time="2025-03-17T18:52:45Z" level=info msg="torcx already run" Mar 17 18:52:45.446249 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Mar 17 18:52:45.446269 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Mar 17 18:52:45.464743 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Mar 17 18:52:45.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.551000 audit: BPF prog-id=44 op=LOAD Mar 17 18:52:45.551000 audit: BPF prog-id=43 op=UNLOAD Mar 17 18:52:45.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.553000 audit: BPF prog-id=45 op=LOAD Mar 17 18:52:45.553000 audit: BPF prog-id=28 op=UNLOAD Mar 17 18:52:45.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.554000 audit: BPF prog-id=46 op=LOAD Mar 17 18:52:45.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.554000 audit: BPF prog-id=47 op=LOAD Mar 17 18:52:45.554000 audit: BPF prog-id=29 op=UNLOAD Mar 17 18:52:45.554000 audit: BPF prog-id=30 op=UNLOAD Mar 17 18:52:45.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.555000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.555000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.555000 audit: BPF prog-id=48 op=LOAD Mar 17 18:52:45.555000 audit: BPF prog-id=36 op=UNLOAD Mar 17 18:52:45.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.557000 audit: BPF prog-id=49 op=LOAD Mar 17 18:52:45.557000 audit: BPF prog-id=38 op=UNLOAD Mar 17 18:52:45.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.558000 audit: BPF prog-id=50 op=LOAD Mar 17 18:52:45.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.558000 audit: BPF prog-id=51 op=LOAD Mar 17 18:52:45.558000 audit: BPF prog-id=39 op=UNLOAD Mar 17 18:52:45.558000 audit: BPF prog-id=40 op=UNLOAD Mar 17 18:52:45.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.559000 audit: BPF prog-id=52 op=LOAD Mar 17 18:52:45.559000 audit: BPF prog-id=37 op=UNLOAD Mar 17 18:52:45.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.560000 audit: BPF prog-id=53 op=LOAD Mar 17 18:52:45.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.561000 audit: BPF prog-id=54 op=LOAD Mar 17 18:52:45.561000 audit: BPF prog-id=31 op=UNLOAD Mar 17 18:52:45.561000 audit: BPF prog-id=32 op=UNLOAD Mar 17 18:52:45.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.562000 audit: BPF prog-id=55 op=LOAD Mar 17 18:52:45.562000 audit: BPF prog-id=33 op=UNLOAD Mar 17 18:52:45.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.562000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.562000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.563000 audit: BPF prog-id=56 op=LOAD Mar 17 18:52:45.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.563000 audit: BPF prog-id=57 op=LOAD Mar 17 18:52:45.563000 audit: BPF prog-id=34 op=UNLOAD Mar 17 18:52:45.563000 audit: BPF prog-id=35 op=UNLOAD Mar 17 18:52:45.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:45.565000 audit: BPF prog-id=58 op=LOAD Mar 17 18:52:45.565000 audit: BPF prog-id=41 op=UNLOAD Mar 17 18:52:45.584547 systemd[1]: Started kubelet.service. Mar 17 18:52:45.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:45.589108 systemd[1]: Stopping kubelet.service... Mar 17 18:52:45.590350 systemd[1]: kubelet.service: Deactivated successfully. Mar 17 18:52:45.590702 systemd[1]: Stopped kubelet.service. Mar 17 18:52:45.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:45.592642 systemd[1]: Starting kubelet.service... Mar 17 18:52:45.673418 systemd[1]: Started kubelet.service. Mar 17 18:52:45.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:45.787018 kubelet[1993]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Mar 17 18:52:45.787018 kubelet[1993]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Mar 17 18:52:45.787018 kubelet[1993]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Mar 17 18:52:45.787379 kubelet[1993]: I0317 18:52:45.787075 1993 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Mar 17 18:52:47.068795 kubelet[1993]: I0317 18:52:47.068752 1993 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Mar 17 18:52:47.068795 kubelet[1993]: I0317 18:52:47.068785 1993 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Mar 17 18:52:47.069131 kubelet[1993]: I0317 18:52:47.069031 1993 server.go:929] "Client rotation is on, will bootstrap in background" Mar 17 18:52:47.087377 kubelet[1993]: I0317 18:52:47.087332 1993 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Mar 17 18:52:47.096997 kubelet[1993]: E0317 18:52:47.096914 1993 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Mar 17 18:52:47.097181 kubelet[1993]: I0317 18:52:47.097166 1993 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Mar 17 18:52:47.101071 kubelet[1993]: I0317 18:52:47.101046 1993 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Mar 17 18:52:47.101987 kubelet[1993]: I0317 18:52:47.101964 1993 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Mar 17 18:52:47.102296 kubelet[1993]: I0317 18:52:47.102268 1993 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Mar 17 18:52:47.102558 kubelet[1993]: I0317 18:52:47.102358 1993 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"10.200.20.21","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Mar 17 18:52:47.102709 kubelet[1993]: I0317 18:52:47.102695 1993 topology_manager.go:138] "Creating topology manager with none policy" Mar 17 18:52:47.102767 kubelet[1993]: I0317 18:52:47.102758 1993 container_manager_linux.go:300] "Creating device plugin manager" Mar 17 18:52:47.102942 kubelet[1993]: I0317 18:52:47.102928 1993 state_mem.go:36] "Initialized new in-memory state store" Mar 17 18:52:47.108112 kubelet[1993]: I0317 18:52:47.108070 1993 kubelet.go:408] "Attempting to sync node with API server" Mar 17 18:52:47.108225 kubelet[1993]: I0317 18:52:47.108214 1993 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Mar 17 18:52:47.108352 kubelet[1993]: I0317 18:52:47.108339 1993 kubelet.go:314] "Adding apiserver pod source" Mar 17 18:52:47.108418 kubelet[1993]: I0317 18:52:47.108409 1993 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Mar 17 18:52:47.111373 kubelet[1993]: E0317 18:52:47.111343 1993 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:52:47.111445 kubelet[1993]: E0317 18:52:47.111392 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:52:47.112433 kubelet[1993]: I0317 18:52:47.112416 1993 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Mar 17 18:52:47.114200 kubelet[1993]: I0317 18:52:47.114182 1993 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Mar 17 18:52:47.114906 kubelet[1993]: W0317 18:52:47.114890 1993 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Mar 17 18:52:47.115568 kubelet[1993]: I0317 18:52:47.115552 1993 server.go:1269] "Started kubelet" Mar 17 18:52:47.122233 kubelet[1993]: I0317 18:52:47.122180 1993 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Mar 17 18:52:47.122831 kubelet[1993]: I0317 18:52:47.122785 1993 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Mar 17 18:52:47.123142 kubelet[1993]: I0317 18:52:47.123108 1993 server.go:460] "Adding debug handlers to kubelet server" Mar 17 18:52:47.123267 kubelet[1993]: I0317 18:52:47.123255 1993 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Mar 17 18:52:47.125894 kubelet[1993]: E0317 18:52:47.125864 1993 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Mar 17 18:52:47.126000 audit[1993]: AVC avc: denied { mac_admin } for pid=1993 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:47.126000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 18:52:47.126000 audit[1993]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40009a14d0 a1=4000923590 a2=40009a14a0 a3=25 items=0 ppid=1 pid=1993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:47.126000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 18:52:47.126947 kubelet[1993]: I0317 18:52:47.126925 1993 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Mar 17 18:52:47.126000 audit[1993]: AVC avc: denied { mac_admin } for pid=1993 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:47.126000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 18:52:47.126000 audit[1993]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400064bbc0 a1=40009235a8 a2=40009a1560 a3=25 items=0 ppid=1 pid=1993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:47.126000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 18:52:47.127213 kubelet[1993]: I0317 18:52:47.127199 1993 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Mar 17 18:52:47.127337 kubelet[1993]: I0317 18:52:47.127326 1993 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Mar 17 18:52:47.128004 kubelet[1993]: I0317 18:52:47.127917 1993 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Mar 17 18:52:47.130047 kubelet[1993]: E0317 18:52:47.130018 1993 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"10.200.20.21\" not found" Mar 17 18:52:47.130120 kubelet[1993]: I0317 18:52:47.130069 1993 volume_manager.go:289] "Starting Kubelet Volume Manager" Mar 17 18:52:47.130298 kubelet[1993]: I0317 18:52:47.130273 1993 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Mar 17 18:52:47.130367 kubelet[1993]: I0317 18:52:47.130350 1993 reconciler.go:26] "Reconciler: start to sync state" Mar 17 18:52:47.133476 kubelet[1993]: I0317 18:52:47.133428 1993 factory.go:221] Registration of the systemd container factory successfully Mar 17 18:52:47.133589 kubelet[1993]: I0317 18:52:47.133559 1993 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Mar 17 18:52:47.134000 audit[2006]: NETFILTER_CFG table=mangle:5 family=2 entries=2 op=nft_register_chain pid=2006 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:52:47.134000 audit[2006]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffcc384ca0 a2=0 a3=1 items=0 ppid=1993 pid=2006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:47.134000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Mar 17 18:52:47.143000 audit[2007]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=2007 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:52:47.143000 audit[2007]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=fffffff149a0 a2=0 a3=1 items=0 ppid=1993 pid=2007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:47.143000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Mar 17 18:52:47.145424 kubelet[1993]: I0317 18:52:47.145385 1993 factory.go:221] Registration of the containerd container factory successfully Mar 17 18:52:47.146000 audit[2009]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=2009 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:52:47.146000 audit[2009]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffea80e3a0 a2=0 a3=1 items=0 ppid=1993 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:47.146000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 18:52:47.148000 audit[2011]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=2011 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:52:47.148000 audit[2011]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd99b8dc0 a2=0 a3=1 items=0 ppid=1993 pid=2011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:47.148000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 18:52:47.152412 kubelet[1993]: E0317 18:52:47.152379 1993 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.20.21\" not found" node="10.200.20.21" Mar 17 18:52:47.170239 kubelet[1993]: I0317 18:52:47.170208 1993 cpu_manager.go:214] "Starting CPU manager" policy="none" Mar 17 18:52:47.170239 kubelet[1993]: I0317 18:52:47.170230 1993 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Mar 17 18:52:47.170239 kubelet[1993]: I0317 18:52:47.170249 1993 state_mem.go:36] "Initialized new in-memory state store" Mar 17 18:52:47.174902 kubelet[1993]: I0317 18:52:47.174870 1993 policy_none.go:49] "None policy: Start" Mar 17 18:52:47.175491 kubelet[1993]: I0317 18:52:47.175469 1993 memory_manager.go:170] "Starting memorymanager" policy="None" Mar 17 18:52:47.175530 kubelet[1993]: I0317 18:52:47.175501 1993 state_mem.go:35] "Initializing new in-memory state store" Mar 17 18:52:47.192604 systemd[1]: Created slice kubepods.slice. Mar 17 18:52:47.198341 systemd[1]: Created slice kubepods-besteffort.slice. Mar 17 18:52:47.209991 systemd[1]: Created slice kubepods-burstable.slice. Mar 17 18:52:47.211459 kubelet[1993]: I0317 18:52:47.211420 1993 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Mar 17 18:52:47.211000 audit[1993]: AVC avc: denied { mac_admin } for pid=1993 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:47.211000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Mar 17 18:52:47.211000 audit[1993]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40008c2fc0 a1=40006e4b70 a2=40008c2f90 a3=25 items=0 ppid=1 pid=1993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:47.211000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Mar 17 18:52:47.211731 kubelet[1993]: I0317 18:52:47.211537 1993 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Mar 17 18:52:47.211731 kubelet[1993]: I0317 18:52:47.211662 1993 eviction_manager.go:189] "Eviction manager: starting control loop" Mar 17 18:52:47.211731 kubelet[1993]: I0317 18:52:47.211672 1993 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Mar 17 18:52:47.212959 kubelet[1993]: I0317 18:52:47.212946 1993 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Mar 17 18:52:47.214059 kubelet[1993]: E0317 18:52:47.214037 1993 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.20.21\" not found" Mar 17 18:52:47.223000 audit[2018]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=2018 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:52:47.223000 audit[2018]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffd5ddb8b0 a2=0 a3=1 items=0 ppid=1993 pid=2018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:47.223000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Mar 17 18:52:47.224946 kubelet[1993]: I0317 18:52:47.224910 1993 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Mar 17 18:52:47.225000 audit[2019]: NETFILTER_CFG table=mangle:10 family=10 entries=2 op=nft_register_chain pid=2019 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:52:47.225000 audit[2019]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc70cd080 a2=0 a3=1 items=0 ppid=1993 pid=2019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:47.225000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Mar 17 18:52:47.226222 kubelet[1993]: I0317 18:52:47.226204 1993 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Mar 17 18:52:47.226303 kubelet[1993]: I0317 18:52:47.226294 1993 status_manager.go:217] "Starting to sync pod status with apiserver" Mar 17 18:52:47.226434 kubelet[1993]: I0317 18:52:47.226424 1993 kubelet.go:2321] "Starting kubelet main sync loop" Mar 17 18:52:47.226640 kubelet[1993]: E0317 18:52:47.226627 1993 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Mar 17 18:52:47.226000 audit[2020]: NETFILTER_CFG table=mangle:11 family=2 entries=1 op=nft_register_chain pid=2020 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:52:47.226000 audit[2020]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff317ebb0 a2=0 a3=1 items=0 ppid=1993 pid=2020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:47.226000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Mar 17 18:52:47.228000 audit[2021]: NETFILTER_CFG table=mangle:12 family=10 entries=1 op=nft_register_chain pid=2021 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:52:47.228000 audit[2021]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd5eb4f40 a2=0 a3=1 items=0 ppid=1993 pid=2021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:47.228000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Mar 17 18:52:47.229000 audit[2022]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=2022 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:52:47.229000 audit[2022]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe7e04fc0 a2=0 a3=1 items=0 ppid=1993 pid=2022 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:47.229000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Mar 17 18:52:47.229000 audit[2023]: NETFILTER_CFG table=nat:14 family=10 entries=2 op=nft_register_chain pid=2023 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:52:47.229000 audit[2023]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffcda06fb0 a2=0 a3=1 items=0 ppid=1993 pid=2023 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:47.229000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Mar 17 18:52:47.231000 audit[2024]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_chain pid=2024 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:52:47.231000 audit[2024]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe1228f60 a2=0 a3=1 items=0 ppid=1993 pid=2024 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:47.231000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Mar 17 18:52:47.231000 audit[2025]: NETFILTER_CFG table=filter:16 family=10 entries=2 op=nft_register_chain pid=2025 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:52:47.231000 audit[2025]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc396df20 a2=0 a3=1 items=0 ppid=1993 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:47.231000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Mar 17 18:52:47.313152 kubelet[1993]: I0317 18:52:47.313123 1993 kubelet_node_status.go:72] "Attempting to register node" node="10.200.20.21" Mar 17 18:52:47.332063 kubelet[1993]: I0317 18:52:47.330383 1993 kubelet_node_status.go:75] "Successfully registered node" node="10.200.20.21" Mar 17 18:52:47.348960 kubelet[1993]: I0317 18:52:47.348934 1993 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Mar 17 18:52:47.349663 env[1471]: time="2025-03-17T18:52:47.349546866Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Mar 17 18:52:47.350075 kubelet[1993]: I0317 18:52:47.349997 1993 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Mar 17 18:52:47.707000 audit[1865]: USER_END pid=1865 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:52:47.708000 audit[1865]: CRED_DISP pid=1865 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Mar 17 18:52:47.708368 sudo[1865]: pam_unix(sudo:session): session closed for user root Mar 17 18:52:47.794507 sshd[1862]: pam_unix(sshd:session): session closed for user core Mar 17 18:52:47.795000 audit[1862]: USER_END pid=1862 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:47.795000 audit[1862]: CRED_DISP pid=1862 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Mar 17 18:52:47.797099 systemd[1]: session-9.scope: Deactivated successfully. Mar 17 18:52:47.797736 systemd-logind[1459]: Session 9 logged out. Waiting for processes to exit. Mar 17 18:52:47.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.21:22-10.200.16.10:42086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Mar 17 18:52:47.797844 systemd[1]: sshd@6-10.200.20.21:22-10.200.16.10:42086.service: Deactivated successfully. Mar 17 18:52:47.798889 systemd-logind[1459]: Removed session 9. Mar 17 18:52:48.073392 kubelet[1993]: I0317 18:52:48.073285 1993 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Mar 17 18:52:48.074116 kubelet[1993]: W0317 18:52:48.074091 1993 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.Service ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Mar 17 18:52:48.074270 kubelet[1993]: W0317 18:52:48.074256 1993 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.RuntimeClass ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Mar 17 18:52:48.074327 kubelet[1993]: W0317 18:52:48.074116 1993 reflector.go:484] k8s.io/client-go/informers/factory.go:160: watch of *v1.CSIDriver ended with: very short watch: k8s.io/client-go/informers/factory.go:160: Unexpected watch close - watch lasted less than a second and no items received Mar 17 18:52:48.111753 kubelet[1993]: E0317 18:52:48.111708 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:52:48.111962 kubelet[1993]: I0317 18:52:48.111948 1993 apiserver.go:52] "Watching apiserver" Mar 17 18:52:48.115690 kubelet[1993]: E0317 18:52:48.115642 1993 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tj7xp" podUID="e01566be-0dda-44dc-a16f-a31dc9338945" Mar 17 18:52:48.120734 systemd[1]: Created slice kubepods-besteffort-poddcf8e1ab_2e7d_47b8_a9a5_ebe9d3adca72.slice. Mar 17 18:52:48.131103 systemd[1]: Created slice kubepods-besteffort-pod3c3f3c59_ae88_49c2_a957_a304f9f93ce0.slice. Mar 17 18:52:48.133092 kubelet[1993]: I0317 18:52:48.133053 1993 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Mar 17 18:52:48.134412 kubelet[1993]: I0317 18:52:48.134051 1993 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/e01566be-0dda-44dc-a16f-a31dc9338945-kubelet-dir\") pod \"csi-node-driver-tj7xp\" (UID: \"e01566be-0dda-44dc-a16f-a31dc9338945\") " pod="calico-system/csi-node-driver-tj7xp" Mar 17 18:52:48.134412 kubelet[1993]: I0317 18:52:48.134080 1993 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/3c3f3c59-ae88-49c2-a957-a304f9f93ce0-kube-proxy\") pod \"kube-proxy-g2f22\" (UID: \"3c3f3c59-ae88-49c2-a957-a304f9f93ce0\") " pod="kube-system/kube-proxy-g2f22" Mar 17 18:52:48.134412 kubelet[1993]: I0317 18:52:48.134100 1993 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/3c3f3c59-ae88-49c2-a957-a304f9f93ce0-xtables-lock\") pod \"kube-proxy-g2f22\" (UID: \"3c3f3c59-ae88-49c2-a957-a304f9f93ce0\") " pod="kube-system/kube-proxy-g2f22" Mar 17 18:52:48.134412 kubelet[1993]: I0317 18:52:48.134116 1993 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/dcf8e1ab-2e7d-47b8-a9a5-ebe9d3adca72-xtables-lock\") pod \"calico-node-qt6ct\" (UID: \"dcf8e1ab-2e7d-47b8-a9a5-ebe9d3adca72\") " pod="calico-system/calico-node-qt6ct" Mar 17 18:52:48.134412 kubelet[1993]: I0317 18:52:48.134132 1993 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/dcf8e1ab-2e7d-47b8-a9a5-ebe9d3adca72-var-lib-calico\") pod \"calico-node-qt6ct\" (UID: \"dcf8e1ab-2e7d-47b8-a9a5-ebe9d3adca72\") " pod="calico-system/calico-node-qt6ct" Mar 17 18:52:48.134651 kubelet[1993]: I0317 18:52:48.134148 1993 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/dcf8e1ab-2e7d-47b8-a9a5-ebe9d3adca72-cni-bin-dir\") pod \"calico-node-qt6ct\" (UID: \"dcf8e1ab-2e7d-47b8-a9a5-ebe9d3adca72\") " pod="calico-system/calico-node-qt6ct" Mar 17 18:52:48.134651 kubelet[1993]: I0317 18:52:48.134162 1993 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/dcf8e1ab-2e7d-47b8-a9a5-ebe9d3adca72-cni-log-dir\") pod \"calico-node-qt6ct\" (UID: \"dcf8e1ab-2e7d-47b8-a9a5-ebe9d3adca72\") " pod="calico-system/calico-node-qt6ct" Mar 17 18:52:48.134651 kubelet[1993]: I0317 18:52:48.134177 1993 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/e01566be-0dda-44dc-a16f-a31dc9338945-varrun\") pod \"csi-node-driver-tj7xp\" (UID: \"e01566be-0dda-44dc-a16f-a31dc9338945\") " pod="calico-system/csi-node-driver-tj7xp" Mar 17 18:52:48.134651 kubelet[1993]: I0317 18:52:48.134194 1993 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/3c3f3c59-ae88-49c2-a957-a304f9f93ce0-lib-modules\") pod \"kube-proxy-g2f22\" (UID: \"3c3f3c59-ae88-49c2-a957-a304f9f93ce0\") " pod="kube-system/kube-proxy-g2f22" Mar 17 18:52:48.134651 kubelet[1993]: I0317 18:52:48.134209 1993 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bg94t\" (UniqueName: \"kubernetes.io/projected/3c3f3c59-ae88-49c2-a957-a304f9f93ce0-kube-api-access-bg94t\") pod \"kube-proxy-g2f22\" (UID: \"3c3f3c59-ae88-49c2-a957-a304f9f93ce0\") " pod="kube-system/kube-proxy-g2f22" Mar 17 18:52:48.134760 kubelet[1993]: I0317 18:52:48.134224 1993 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/dcf8e1ab-2e7d-47b8-a9a5-ebe9d3adca72-lib-modules\") pod \"calico-node-qt6ct\" (UID: \"dcf8e1ab-2e7d-47b8-a9a5-ebe9d3adca72\") " pod="calico-system/calico-node-qt6ct" Mar 17 18:52:48.134760 kubelet[1993]: I0317 18:52:48.134242 1993 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/e01566be-0dda-44dc-a16f-a31dc9338945-socket-dir\") pod \"csi-node-driver-tj7xp\" (UID: \"e01566be-0dda-44dc-a16f-a31dc9338945\") " pod="calico-system/csi-node-driver-tj7xp" Mar 17 18:52:48.134760 kubelet[1993]: I0317 18:52:48.134257 1993 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sfb2k\" (UniqueName: \"kubernetes.io/projected/e01566be-0dda-44dc-a16f-a31dc9338945-kube-api-access-sfb2k\") pod \"csi-node-driver-tj7xp\" (UID: \"e01566be-0dda-44dc-a16f-a31dc9338945\") " pod="calico-system/csi-node-driver-tj7xp" Mar 17 18:52:48.134760 kubelet[1993]: I0317 18:52:48.134272 1993 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/dcf8e1ab-2e7d-47b8-a9a5-ebe9d3adca72-node-certs\") pod \"calico-node-qt6ct\" (UID: \"dcf8e1ab-2e7d-47b8-a9a5-ebe9d3adca72\") " pod="calico-system/calico-node-qt6ct" Mar 17 18:52:48.134760 kubelet[1993]: I0317 18:52:48.134292 1993 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/dcf8e1ab-2e7d-47b8-a9a5-ebe9d3adca72-var-run-calico\") pod \"calico-node-qt6ct\" (UID: \"dcf8e1ab-2e7d-47b8-a9a5-ebe9d3adca72\") " pod="calico-system/calico-node-qt6ct" Mar 17 18:52:48.134902 kubelet[1993]: I0317 18:52:48.134311 1993 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gw9cm\" (UniqueName: \"kubernetes.io/projected/dcf8e1ab-2e7d-47b8-a9a5-ebe9d3adca72-kube-api-access-gw9cm\") pod \"calico-node-qt6ct\" (UID: \"dcf8e1ab-2e7d-47b8-a9a5-ebe9d3adca72\") " pod="calico-system/calico-node-qt6ct" Mar 17 18:52:48.134902 kubelet[1993]: I0317 18:52:48.134325 1993 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/e01566be-0dda-44dc-a16f-a31dc9338945-registration-dir\") pod \"csi-node-driver-tj7xp\" (UID: \"e01566be-0dda-44dc-a16f-a31dc9338945\") " pod="calico-system/csi-node-driver-tj7xp" Mar 17 18:52:48.134902 kubelet[1993]: I0317 18:52:48.134339 1993 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/dcf8e1ab-2e7d-47b8-a9a5-ebe9d3adca72-policysync\") pod \"calico-node-qt6ct\" (UID: \"dcf8e1ab-2e7d-47b8-a9a5-ebe9d3adca72\") " pod="calico-system/calico-node-qt6ct" Mar 17 18:52:48.134902 kubelet[1993]: I0317 18:52:48.134353 1993 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/dcf8e1ab-2e7d-47b8-a9a5-ebe9d3adca72-tigera-ca-bundle\") pod \"calico-node-qt6ct\" (UID: \"dcf8e1ab-2e7d-47b8-a9a5-ebe9d3adca72\") " pod="calico-system/calico-node-qt6ct" Mar 17 18:52:48.134902 kubelet[1993]: I0317 18:52:48.134369 1993 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/dcf8e1ab-2e7d-47b8-a9a5-ebe9d3adca72-cni-net-dir\") pod \"calico-node-qt6ct\" (UID: \"dcf8e1ab-2e7d-47b8-a9a5-ebe9d3adca72\") " pod="calico-system/calico-node-qt6ct" Mar 17 18:52:48.135010 kubelet[1993]: I0317 18:52:48.134386 1993 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/dcf8e1ab-2e7d-47b8-a9a5-ebe9d3adca72-flexvol-driver-host\") pod \"calico-node-qt6ct\" (UID: \"dcf8e1ab-2e7d-47b8-a9a5-ebe9d3adca72\") " pod="calico-system/calico-node-qt6ct" Mar 17 18:52:48.236672 kubelet[1993]: I0317 18:52:48.236636 1993 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Mar 17 18:52:48.243708 kubelet[1993]: E0317 18:52:48.243598 1993 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:52:48.243708 kubelet[1993]: W0317 18:52:48.243620 1993 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:52:48.243708 kubelet[1993]: E0317 18:52:48.243649 1993 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:52:48.256982 kubelet[1993]: E0317 18:52:48.256429 1993 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:52:48.256982 kubelet[1993]: W0317 18:52:48.256564 1993 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:52:48.256982 kubelet[1993]: E0317 18:52:48.256662 1993 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:52:48.260537 kubelet[1993]: E0317 18:52:48.260423 1993 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:52:48.260537 kubelet[1993]: W0317 18:52:48.260473 1993 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:52:48.260537 kubelet[1993]: E0317 18:52:48.260503 1993 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:52:48.261237 kubelet[1993]: E0317 18:52:48.260891 1993 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Mar 17 18:52:48.261237 kubelet[1993]: W0317 18:52:48.260909 1993 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Mar 17 18:52:48.261237 kubelet[1993]: E0317 18:52:48.260966 1993 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Mar 17 18:52:48.432382 env[1471]: time="2025-03-17T18:52:48.430154640Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-qt6ct,Uid:dcf8e1ab-2e7d-47b8-a9a5-ebe9d3adca72,Namespace:calico-system,Attempt:0,}" Mar 17 18:52:48.437237 env[1471]: time="2025-03-17T18:52:48.437062116Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-g2f22,Uid:3c3f3c59-ae88-49c2-a957-a304f9f93ce0,Namespace:kube-system,Attempt:0,}" Mar 17 18:52:49.112492 kubelet[1993]: E0317 18:52:49.112442 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:52:49.228744 kubelet[1993]: E0317 18:52:49.228700 1993 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tj7xp" podUID="e01566be-0dda-44dc-a16f-a31dc9338945" Mar 17 18:52:50.112941 kubelet[1993]: E0317 18:52:50.112882 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:52:51.113631 kubelet[1993]: E0317 18:52:51.113583 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:52:51.227183 kubelet[1993]: E0317 18:52:51.226838 1993 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tj7xp" podUID="e01566be-0dda-44dc-a16f-a31dc9338945" Mar 17 18:52:51.461176 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2530095310.mount: Deactivated successfully. Mar 17 18:52:51.491801 env[1471]: time="2025-03-17T18:52:51.491748018Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:52:51.510348 env[1471]: time="2025-03-17T18:52:51.510295426Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:52:51.520647 env[1471]: time="2025-03-17T18:52:51.520611482Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:52:51.537005 env[1471]: time="2025-03-17T18:52:51.536965578Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:52:51.542368 env[1471]: time="2025-03-17T18:52:51.542320306Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:52:51.551637 env[1471]: time="2025-03-17T18:52:51.551604492Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:52:51.558512 env[1471]: time="2025-03-17T18:52:51.558445618Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:52:51.566146 env[1471]: time="2025-03-17T18:52:51.566098230Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:52:51.633726 env[1471]: time="2025-03-17T18:52:51.633629639Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:52:51.633939 env[1471]: time="2025-03-17T18:52:51.633896307Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:52:51.633939 env[1471]: time="2025-03-17T18:52:51.633915910Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:52:51.634285 env[1471]: time="2025-03-17T18:52:51.634240864Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cd0ab79546e9259356756d3578c163d75c60a6929d223ab24c5ae6888a3fd83b pid=2042 runtime=io.containerd.runc.v2 Mar 17 18:52:51.653737 env[1471]: time="2025-03-17T18:52:51.653656525Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:52:51.653938 env[1471]: time="2025-03-17T18:52:51.653915913Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:52:51.654472 env[1471]: time="2025-03-17T18:52:51.654348199Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:52:51.655108 env[1471]: time="2025-03-17T18:52:51.654809487Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c3f0cd2ac5c5995158073c70cb79a166ffe3884908a00f07f2b80a004a54a594 pid=2061 runtime=io.containerd.runc.v2 Mar 17 18:52:51.661352 systemd[1]: Started cri-containerd-cd0ab79546e9259356756d3578c163d75c60a6929d223ab24c5ae6888a3fd83b.scope. Mar 17 18:52:51.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.679570 kernel: kauditd_printk_skb: 242 callbacks suppressed Mar 17 18:52:51.679720 kernel: audit: type=1400 audit(1742237571.673:432): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.709852 kernel: audit: type=1400 audit(1742237571.673:433): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.726714 kernel: audit: type=1400 audit(1742237571.673:434): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.728382 systemd[1]: Started cri-containerd-c3f0cd2ac5c5995158073c70cb79a166ffe3884908a00f07f2b80a004a54a594.scope. Mar 17 18:52:51.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.745392 kernel: audit: type=1400 audit(1742237571.673:435): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.764355 kernel: audit: type=1400 audit(1742237571.673:436): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.782760 kernel: audit: type=1400 audit(1742237571.673:437): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.800750 kernel: audit: type=1400 audit(1742237571.673:438): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.800852 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Mar 17 18:52:51.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.825960 kernel: audit: type=1400 audit(1742237571.673:439): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.826057 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Mar 17 18:52:51.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.673000 audit: BPF prog-id=59 op=LOAD Mar 17 18:52:51.683000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.683000 audit[2062]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2042 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:51.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364306162373935343665393235393335363735366433353738633136 Mar 17 18:52:51.683000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.683000 audit[2062]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2042 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:51.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364306162373935343665393235393335363735366433353738633136 Mar 17 18:52:51.684000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.684000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.684000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.684000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.684000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.684000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.684000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.684000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.684000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.684000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.684000 audit: BPF prog-id=60 op=LOAD Mar 17 18:52:51.684000 audit[2062]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2042 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:51.684000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364306162373935343665393235393335363735366433353738633136 Mar 17 18:52:51.699000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.699000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.699000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.699000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.699000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.699000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.699000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.699000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.699000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.699000 audit: BPF prog-id=61 op=LOAD Mar 17 18:52:51.699000 audit[2062]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2042 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:51.699000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364306162373935343665393235393335363735366433353738633136 Mar 17 18:52:51.708000 audit: BPF prog-id=61 op=UNLOAD Mar 17 18:52:51.708000 audit: BPF prog-id=60 op=UNLOAD Mar 17 18:52:51.708000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.708000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.708000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.708000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.708000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.708000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.708000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.708000 audit[2062]: AVC avc: denied { perfmon } for pid=2062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.708000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.708000 audit[2062]: AVC avc: denied { bpf } for pid=2062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.708000 audit: BPF prog-id=62 op=LOAD Mar 17 18:52:51.708000 audit[2062]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2042 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:51.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364306162373935343665393235393335363735366433353738633136 Mar 17 18:52:51.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.830000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.830000 audit[2080]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2061 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:51.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333663063643261633563353939353135383037336337306362373961 Mar 17 18:52:51.830000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.830000 audit[2080]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2061 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:51.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333663063643261633563353939353135383037336337306362373961 Mar 17 18:52:51.830000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.830000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.830000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.830000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.830000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.830000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.830000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.830000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.830000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.830000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.830000 audit: BPF prog-id=64 op=LOAD Mar 17 18:52:51.830000 audit[2080]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2061 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:51.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333663063643261633563353939353135383037336337306362373961 Mar 17 18:52:51.831000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.831000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.831000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.831000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.831000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.831000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.831000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.831000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.831000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.831000 audit: BPF prog-id=65 op=LOAD Mar 17 18:52:51.831000 audit[2080]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2061 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:51.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333663063643261633563353939353135383037336337306362373961 Mar 17 18:52:51.831000 audit: BPF prog-id=65 op=UNLOAD Mar 17 18:52:51.831000 audit: BPF prog-id=64 op=UNLOAD Mar 17 18:52:51.831000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.831000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.831000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.831000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.831000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.831000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.831000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.831000 audit[2080]: AVC avc: denied { perfmon } for pid=2080 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.831000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.831000 audit[2080]: AVC avc: denied { bpf } for pid=2080 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:51.831000 audit: BPF prog-id=66 op=LOAD Mar 17 18:52:51.831000 audit[2080]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2061 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:51.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333663063643261633563353939353135383037336337306362373961 Mar 17 18:52:51.836697 env[1471]: time="2025-03-17T18:52:51.836639150Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-qt6ct,Uid:dcf8e1ab-2e7d-47b8-a9a5-ebe9d3adca72,Namespace:calico-system,Attempt:0,} returns sandbox id \"cd0ab79546e9259356756d3578c163d75c60a6929d223ab24c5ae6888a3fd83b\"" Mar 17 18:52:51.839530 env[1471]: time="2025-03-17T18:52:51.839374040Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Mar 17 18:52:51.845850 env[1471]: time="2025-03-17T18:52:51.845807483Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-g2f22,Uid:3c3f3c59-ae88-49c2-a957-a304f9f93ce0,Namespace:kube-system,Attempt:0,} returns sandbox id \"c3f0cd2ac5c5995158073c70cb79a166ffe3884908a00f07f2b80a004a54a594\"" Mar 17 18:52:52.114784 kubelet[1993]: E0317 18:52:52.114654 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:52:53.115331 kubelet[1993]: E0317 18:52:53.115300 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:52:53.227947 kubelet[1993]: E0317 18:52:53.227589 1993 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tj7xp" podUID="e01566be-0dda-44dc-a16f-a31dc9338945" Mar 17 18:52:53.478832 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2373582912.mount: Deactivated successfully. Mar 17 18:52:53.636504 env[1471]: time="2025-03-17T18:52:53.636432386Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:52:53.644510 env[1471]: time="2025-03-17T18:52:53.644475754Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:52:53.650453 env[1471]: time="2025-03-17T18:52:53.650413831Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:52:53.658374 env[1471]: time="2025-03-17T18:52:53.658336427Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:52:53.658638 env[1471]: time="2025-03-17T18:52:53.658613055Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348\"" Mar 17 18:52:53.660391 env[1471]: time="2025-03-17T18:52:53.660358670Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.7\"" Mar 17 18:52:53.665470 env[1471]: time="2025-03-17T18:52:53.665423019Z" level=info msg="CreateContainer within sandbox \"cd0ab79546e9259356756d3578c163d75c60a6929d223ab24c5ae6888a3fd83b\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Mar 17 18:52:53.696799 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3450196049.mount: Deactivated successfully. Mar 17 18:52:53.713957 env[1471]: time="2025-03-17T18:52:53.713884768Z" level=info msg="CreateContainer within sandbox \"cd0ab79546e9259356756d3578c163d75c60a6929d223ab24c5ae6888a3fd83b\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"1a82403a9ae2f7c65d05a63a4bd4e1670be00bfddb1011eaefb238501a784b50\"" Mar 17 18:52:53.714799 env[1471]: time="2025-03-17T18:52:53.714771177Z" level=info msg="StartContainer for \"1a82403a9ae2f7c65d05a63a4bd4e1670be00bfddb1011eaefb238501a784b50\"" Mar 17 18:52:53.732759 systemd[1]: Started cri-containerd-1a82403a9ae2f7c65d05a63a4bd4e1670be00bfddb1011eaefb238501a784b50.scope. Mar 17 18:52:53.750000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:53.750000 audit[2125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2042 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:53.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161383234303361396165326637633635643035613633613462643465 Mar 17 18:52:53.751000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:53.751000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:53.751000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:53.751000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:53.751000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:53.751000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:53.751000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:53.751000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:53.751000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:53.751000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:53.751000 audit: BPF prog-id=67 op=LOAD Mar 17 18:52:53.751000 audit[2125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2042 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:53.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161383234303361396165326637633635643035613633613462643465 Mar 17 18:52:53.751000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:53.751000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:53.751000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:53.751000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:53.751000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:53.751000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:53.751000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:53.751000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:53.751000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:53.751000 audit: BPF prog-id=68 op=LOAD Mar 17 18:52:53.751000 audit[2125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2042 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:53.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161383234303361396165326637633635643035613633613462643465 Mar 17 18:52:53.751000 audit: BPF prog-id=68 op=UNLOAD Mar 17 18:52:53.751000 audit: BPF prog-id=67 op=UNLOAD Mar 17 18:52:53.751000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:53.751000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:53.751000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:53.751000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:53.751000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:53.751000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:53.751000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:53.751000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:53.751000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:53.751000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:53.751000 audit: BPF prog-id=69 op=LOAD Mar 17 18:52:53.751000 audit[2125]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2042 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:53.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161383234303361396165326637633635643035613633613462643465 Mar 17 18:52:53.774603 systemd[1]: cri-containerd-1a82403a9ae2f7c65d05a63a4bd4e1670be00bfddb1011eaefb238501a784b50.scope: Deactivated successfully. Mar 17 18:52:53.775190 env[1471]: time="2025-03-17T18:52:53.774998989Z" level=info msg="StartContainer for \"1a82403a9ae2f7c65d05a63a4bd4e1670be00bfddb1011eaefb238501a784b50\" returns successfully" Mar 17 18:52:53.776000 audit: BPF prog-id=69 op=UNLOAD Mar 17 18:52:53.875182 env[1471]: time="2025-03-17T18:52:53.875136932Z" level=info msg="shim disconnected" id=1a82403a9ae2f7c65d05a63a4bd4e1670be00bfddb1011eaefb238501a784b50 Mar 17 18:52:53.875476 env[1471]: time="2025-03-17T18:52:53.875427321Z" level=warning msg="cleaning up after shim disconnected" id=1a82403a9ae2f7c65d05a63a4bd4e1670be00bfddb1011eaefb238501a784b50 namespace=k8s.io Mar 17 18:52:53.875575 env[1471]: time="2025-03-17T18:52:53.875560094Z" level=info msg="cleaning up dead shim" Mar 17 18:52:53.882533 env[1471]: time="2025-03-17T18:52:53.882496471Z" level=warning msg="cleanup warnings time=\"2025-03-17T18:52:53Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2164 runtime=io.containerd.runc.v2\n" Mar 17 18:52:54.116579 kubelet[1993]: E0317 18:52:54.116445 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:52:54.481738 systemd[1]: run-containerd-runc-k8s.io-1a82403a9ae2f7c65d05a63a4bd4e1670be00bfddb1011eaefb238501a784b50-runc.6ScQvy.mount: Deactivated successfully. Mar 17 18:52:54.481821 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1a82403a9ae2f7c65d05a63a4bd4e1670be00bfddb1011eaefb238501a784b50-rootfs.mount: Deactivated successfully. Mar 17 18:52:54.794763 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1445724982.mount: Deactivated successfully. Mar 17 18:52:55.117552 kubelet[1993]: E0317 18:52:55.117439 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:52:55.227797 kubelet[1993]: E0317 18:52:55.227404 1993 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tj7xp" podUID="e01566be-0dda-44dc-a16f-a31dc9338945" Mar 17 18:52:55.336789 env[1471]: time="2025-03-17T18:52:55.336737786Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:52:55.351629 env[1471]: time="2025-03-17T18:52:55.351573118Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:939054a0dc9c7c1596b061fc2380758139ce62751b44a0b21b3afc7abd7eb3ff,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:52:55.355513 env[1471]: time="2025-03-17T18:52:55.355480890Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:52:55.366717 env[1471]: time="2025-03-17T18:52:55.366672595Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:e5839270c96c3ad1bea1dce4935126d3281297527f3655408d2970aa4b5cf178,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:52:55.367224 env[1471]: time="2025-03-17T18:52:55.367198405Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.7\" returns image reference \"sha256:939054a0dc9c7c1596b061fc2380758139ce62751b44a0b21b3afc7abd7eb3ff\"" Mar 17 18:52:55.369522 env[1471]: time="2025-03-17T18:52:55.369289444Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Mar 17 18:52:55.370079 env[1471]: time="2025-03-17T18:52:55.370048236Z" level=info msg="CreateContainer within sandbox \"c3f0cd2ac5c5995158073c70cb79a166ffe3884908a00f07f2b80a004a54a594\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Mar 17 18:52:55.410852 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2411184398.mount: Deactivated successfully. Mar 17 18:52:55.442136 env[1471]: time="2025-03-17T18:52:55.442071210Z" level=info msg="CreateContainer within sandbox \"c3f0cd2ac5c5995158073c70cb79a166ffe3884908a00f07f2b80a004a54a594\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"6a1632ea784cab1fba5b1690b814dfa1c484de28184d497da5cee9adb2df131e\"" Mar 17 18:52:55.443037 env[1471]: time="2025-03-17T18:52:55.443013980Z" level=info msg="StartContainer for \"6a1632ea784cab1fba5b1690b814dfa1c484de28184d497da5cee9adb2df131e\"" Mar 17 18:52:55.458562 systemd[1]: Started cri-containerd-6a1632ea784cab1fba5b1690b814dfa1c484de28184d497da5cee9adb2df131e.scope. Mar 17 18:52:55.473000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:55.473000 audit[2191]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2061 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661313633326561373834636162316662613562313639306238313464 Mar 17 18:52:55.473000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:55.473000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:55.473000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:55.473000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:55.473000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:55.473000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:55.473000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:55.473000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:55.473000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:55.473000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:55.473000 audit: BPF prog-id=70 op=LOAD Mar 17 18:52:55.473000 audit[2191]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2061 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661313633326561373834636162316662613562313639306238313464 Mar 17 18:52:55.473000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:55.473000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:55.473000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:55.473000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:55.473000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:55.473000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:55.473000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:55.473000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:55.473000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:55.473000 audit: BPF prog-id=71 op=LOAD Mar 17 18:52:55.473000 audit[2191]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2061 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661313633326561373834636162316662613562313639306238313464 Mar 17 18:52:55.473000 audit: BPF prog-id=71 op=UNLOAD Mar 17 18:52:55.473000 audit: BPF prog-id=70 op=UNLOAD Mar 17 18:52:55.473000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:55.473000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:55.473000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:55.473000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:55.473000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:55.473000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:55.473000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:55.473000 audit[2191]: AVC avc: denied { perfmon } for pid=2191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:55.473000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:55.473000 audit[2191]: AVC avc: denied { bpf } for pid=2191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:55.473000 audit: BPF prog-id=72 op=LOAD Mar 17 18:52:55.473000 audit[2191]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2061 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661313633326561373834636162316662613562313639306238313464 Mar 17 18:52:55.481749 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2628461175.mount: Deactivated successfully. Mar 17 18:52:55.498421 env[1471]: time="2025-03-17T18:52:55.498373208Z" level=info msg="StartContainer for \"6a1632ea784cab1fba5b1690b814dfa1c484de28184d497da5cee9adb2df131e\" returns successfully" Mar 17 18:52:55.628000 audit[2251]: NETFILTER_CFG table=mangle:17 family=10 entries=1 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:52:55.628000 audit[2251]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff5a2be30 a2=0 a3=1 items=0 ppid=2202 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.628000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Mar 17 18:52:55.629000 audit[2252]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:52:55.629000 audit[2252]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff2d3a630 a2=0 a3=1 items=0 ppid=2202 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.629000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Mar 17 18:52:55.631000 audit[2253]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:52:55.631000 audit[2253]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe0b79450 a2=0 a3=1 items=0 ppid=2202 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.631000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Mar 17 18:52:55.632000 audit[2254]: NETFILTER_CFG table=mangle:20 family=2 entries=1 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:52:55.632000 audit[2254]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffed8c0b30 a2=0 a3=1 items=0 ppid=2202 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.632000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Mar 17 18:52:55.633000 audit[2255]: NETFILTER_CFG table=nat:21 family=2 entries=1 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:52:55.633000 audit[2255]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff9cf8f20 a2=0 a3=1 items=0 ppid=2202 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.633000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Mar 17 18:52:55.634000 audit[2256]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:52:55.634000 audit[2256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe5999f00 a2=0 a3=1 items=0 ppid=2202 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.634000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Mar 17 18:52:55.732000 audit[2257]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:52:55.732000 audit[2257]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffdd37df40 a2=0 a3=1 items=0 ppid=2202 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.732000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Mar 17 18:52:55.734000 audit[2259]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2259 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:52:55.734000 audit[2259]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffff4605ce0 a2=0 a3=1 items=0 ppid=2202 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.734000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Mar 17 18:52:55.738000 audit[2262]: NETFILTER_CFG table=filter:25 family=2 entries=2 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:52:55.738000 audit[2262]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffcd9a65b0 a2=0 a3=1 items=0 ppid=2202 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.738000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Mar 17 18:52:55.739000 audit[2263]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_chain pid=2263 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:52:55.739000 audit[2263]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff32b44f0 a2=0 a3=1 items=0 ppid=2202 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.739000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Mar 17 18:52:55.742000 audit[2265]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2265 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:52:55.742000 audit[2265]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe05a3c50 a2=0 a3=1 items=0 ppid=2202 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.742000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Mar 17 18:52:55.743000 audit[2266]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2266 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:52:55.743000 audit[2266]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe748c4b0 a2=0 a3=1 items=0 ppid=2202 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.743000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Mar 17 18:52:55.745000 audit[2268]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2268 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:52:55.745000 audit[2268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe7d7c3e0 a2=0 a3=1 items=0 ppid=2202 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.745000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Mar 17 18:52:55.749000 audit[2271]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2271 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:52:55.749000 audit[2271]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe02d2bd0 a2=0 a3=1 items=0 ppid=2202 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.749000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Mar 17 18:52:55.750000 audit[2272]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2272 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:52:55.750000 audit[2272]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffc9f5f20 a2=0 a3=1 items=0 ppid=2202 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.750000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Mar 17 18:52:55.753000 audit[2274]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2274 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:52:55.753000 audit[2274]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcf959070 a2=0 a3=1 items=0 ppid=2202 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.753000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Mar 17 18:52:55.754000 audit[2275]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:52:55.754000 audit[2275]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd5108d10 a2=0 a3=1 items=0 ppid=2202 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.754000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Mar 17 18:52:55.758000 audit[2277]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2277 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:52:55.758000 audit[2277]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdd0da570 a2=0 a3=1 items=0 ppid=2202 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.758000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Mar 17 18:52:55.763000 audit[2280]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2280 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:52:55.763000 audit[2280]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffed8e1150 a2=0 a3=1 items=0 ppid=2202 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.763000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Mar 17 18:52:55.766000 audit[2283]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2283 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:52:55.766000 audit[2283]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc2e872b0 a2=0 a3=1 items=0 ppid=2202 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.766000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Mar 17 18:52:55.768000 audit[2284]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2284 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:52:55.768000 audit[2284]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe9a24c50 a2=0 a3=1 items=0 ppid=2202 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.768000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Mar 17 18:52:55.770000 audit[2286]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:52:55.770000 audit[2286]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffffd80da80 a2=0 a3=1 items=0 ppid=2202 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.770000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 18:52:55.859000 audit[2290]: NETFILTER_CFG table=nat:39 family=2 entries=2 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:52:55.859000 audit[2290]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc3fb6440 a2=0 a3=1 items=0 ppid=2202 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.859000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 18:52:55.860000 audit[2291]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:52:55.860000 audit[2291]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe2ba8530 a2=0 a3=1 items=0 ppid=2202 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.860000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Mar 17 18:52:55.862000 audit[2293]: NETFILTER_CFG table=nat:41 family=2 entries=2 op=nft_register_chain pid=2293 subj=system_u:system_r:kernel_t:s0 comm="iptables" Mar 17 18:52:55.862000 audit[2293]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffcc7775e0 a2=0 a3=1 items=0 ppid=2202 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.862000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Mar 17 18:52:55.892000 audit[2299]: NETFILTER_CFG table=filter:42 family=2 entries=5 op=nft_register_rule pid=2299 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:52:55.892000 audit[2299]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffe6a5ea30 a2=0 a3=1 items=0 ppid=2202 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.892000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:52:55.932000 audit[2299]: NETFILTER_CFG table=nat:43 family=2 entries=65 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:52:55.932000 audit[2299]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30940 a0=3 a1=ffffe6a5ea30 a2=0 a3=1 items=0 ppid=2202 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.932000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:52:55.956000 audit[2308]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:52:55.956000 audit[2308]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffcc18d490 a2=0 a3=1 items=0 ppid=2202 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.956000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Mar 17 18:52:55.958000 audit[2310]: NETFILTER_CFG table=filter:45 family=10 entries=2 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:52:55.958000 audit[2310]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc734c210 a2=0 a3=1 items=0 ppid=2202 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.958000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Mar 17 18:52:55.962000 audit[2313]: NETFILTER_CFG table=filter:46 family=10 entries=2 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:52:55.962000 audit[2313]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc9205cf0 a2=0 a3=1 items=0 ppid=2202 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.962000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Mar 17 18:52:55.963000 audit[2314]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:52:55.963000 audit[2314]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe32be4e0 a2=0 a3=1 items=0 ppid=2202 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.963000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Mar 17 18:52:55.965000 audit[2316]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2316 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:52:55.965000 audit[2316]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffecbc6190 a2=0 a3=1 items=0 ppid=2202 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.965000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Mar 17 18:52:55.966000 audit[2317]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:52:55.966000 audit[2317]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff078b6b0 a2=0 a3=1 items=0 ppid=2202 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.966000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Mar 17 18:52:55.968000 audit[2319]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:52:55.968000 audit[2319]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd2f68020 a2=0 a3=1 items=0 ppid=2202 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.968000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Mar 17 18:52:55.971000 audit[2322]: NETFILTER_CFG table=filter:51 family=10 entries=2 op=nft_register_chain pid=2322 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:52:55.971000 audit[2322]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffc926beb0 a2=0 a3=1 items=0 ppid=2202 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.971000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Mar 17 18:52:55.972000 audit[2323]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_chain pid=2323 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:52:55.972000 audit[2323]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffa3ff6a0 a2=0 a3=1 items=0 ppid=2202 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.972000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Mar 17 18:52:55.975000 audit[2325]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:52:55.975000 audit[2325]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffefcdadc0 a2=0 a3=1 items=0 ppid=2202 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.975000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Mar 17 18:52:55.976000 audit[2326]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_chain pid=2326 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:52:55.976000 audit[2326]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe868d350 a2=0 a3=1 items=0 ppid=2202 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.976000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Mar 17 18:52:55.978000 audit[2328]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=2328 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:52:55.978000 audit[2328]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff64e5330 a2=0 a3=1 items=0 ppid=2202 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.978000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Mar 17 18:52:55.981000 audit[2331]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2331 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:52:55.981000 audit[2331]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd9f8ee80 a2=0 a3=1 items=0 ppid=2202 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.981000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Mar 17 18:52:55.984000 audit[2334]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2334 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:52:55.984000 audit[2334]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffea4bb6f0 a2=0 a3=1 items=0 ppid=2202 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.984000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Mar 17 18:52:55.985000 audit[2335]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:52:55.985000 audit[2335]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd3522140 a2=0 a3=1 items=0 ppid=2202 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.985000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Mar 17 18:52:55.988000 audit[2337]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2337 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:52:55.988000 audit[2337]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe37f5100 a2=0 a3=1 items=0 ppid=2202 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.988000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 18:52:55.991000 audit[2340]: NETFILTER_CFG table=nat:60 family=10 entries=2 op=nft_register_chain pid=2340 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:52:55.991000 audit[2340]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffda8dbc40 a2=0 a3=1 items=0 ppid=2202 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.991000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Mar 17 18:52:55.992000 audit[2341]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:52:55.992000 audit[2341]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd06f9310 a2=0 a3=1 items=0 ppid=2202 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.992000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Mar 17 18:52:55.994000 audit[2343]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:52:55.994000 audit[2343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffffa314a00 a2=0 a3=1 items=0 ppid=2202 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.994000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Mar 17 18:52:55.995000 audit[2344]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2344 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:52:55.995000 audit[2344]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc93a0540 a2=0 a3=1 items=0 ppid=2202 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.995000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Mar 17 18:52:55.997000 audit[2346]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=2346 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:52:55.997000 audit[2346]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffed763740 a2=0 a3=1 items=0 ppid=2202 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:55.997000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 18:52:56.001000 audit[2349]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_rule pid=2349 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Mar 17 18:52:56.001000 audit[2349]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc54025e0 a2=0 a3=1 items=0 ppid=2202 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:56.001000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Mar 17 18:52:56.003000 audit[2351]: NETFILTER_CFG table=filter:66 family=10 entries=3 op=nft_register_rule pid=2351 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Mar 17 18:52:56.003000 audit[2351]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffe2305960 a2=0 a3=1 items=0 ppid=2202 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:56.003000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:52:56.004000 audit[2351]: NETFILTER_CFG table=nat:67 family=10 entries=7 op=nft_register_chain pid=2351 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Mar 17 18:52:56.004000 audit[2351]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffe2305960 a2=0 a3=1 items=0 ppid=2202 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:56.004000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:52:56.117830 kubelet[1993]: E0317 18:52:56.117792 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:52:57.118736 kubelet[1993]: E0317 18:52:57.118692 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:52:57.227880 kubelet[1993]: E0317 18:52:57.227845 1993 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tj7xp" podUID="e01566be-0dda-44dc-a16f-a31dc9338945" Mar 17 18:52:58.119050 kubelet[1993]: E0317 18:52:58.118987 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:52:58.883363 env[1471]: time="2025-03-17T18:52:58.883313760Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:52:58.893979 env[1471]: time="2025-03-17T18:52:58.893939412Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:52:58.898881 env[1471]: time="2025-03-17T18:52:58.898844123Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:52:58.909273 env[1471]: time="2025-03-17T18:52:58.909216713Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:52:58.909904 env[1471]: time="2025-03-17T18:52:58.909874131Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f\"" Mar 17 18:52:58.912258 env[1471]: time="2025-03-17T18:52:58.912225457Z" level=info msg="CreateContainer within sandbox \"cd0ab79546e9259356756d3578c163d75c60a6929d223ab24c5ae6888a3fd83b\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Mar 17 18:52:58.952029 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1451307556.mount: Deactivated successfully. Mar 17 18:52:58.970502 env[1471]: time="2025-03-17T18:52:58.970431807Z" level=info msg="CreateContainer within sandbox \"cd0ab79546e9259356756d3578c163d75c60a6929d223ab24c5ae6888a3fd83b\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"a4e15198996f8f5976dad7efc66bef94992f9f1980b972e5f84ec8955f219bc2\"" Mar 17 18:52:58.971213 env[1471]: time="2025-03-17T18:52:58.971183913Z" level=info msg="StartContainer for \"a4e15198996f8f5976dad7efc66bef94992f9f1980b972e5f84ec8955f219bc2\"" Mar 17 18:52:58.996990 systemd[1]: run-containerd-runc-k8s.io-a4e15198996f8f5976dad7efc66bef94992f9f1980b972e5f84ec8955f219bc2-runc.P6Y11b.mount: Deactivated successfully. Mar 17 18:52:58.998480 systemd[1]: Started cri-containerd-a4e15198996f8f5976dad7efc66bef94992f9f1980b972e5f84ec8955f219bc2.scope. Mar 17 18:52:59.018000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.024237 kernel: kauditd_printk_skb: 346 callbacks suppressed Mar 17 18:52:59.024337 kernel: audit: type=1400 audit(1742237579.018:531): avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.018000 audit[2359]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2042 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:59.068437 kernel: audit: type=1300 audit(1742237579.018:531): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2042 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:59.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134653135313938393936663866353937366461643765666336366265 Mar 17 18:52:59.092806 kernel: audit: type=1327 audit(1742237579.018:531): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134653135313938393936663866353937366461643765666336366265 Mar 17 18:52:59.020000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.111073 kernel: audit: type=1400 audit(1742237579.020:532): avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.020000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.119950 kubelet[1993]: E0317 18:52:59.119884 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:52:59.127818 kernel: audit: type=1400 audit(1742237579.020:532): avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.020000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.145035 kernel: audit: type=1400 audit(1742237579.020:532): avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.020000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.154437 env[1471]: time="2025-03-17T18:52:59.154388320Z" level=info msg="StartContainer for \"a4e15198996f8f5976dad7efc66bef94992f9f1980b972e5f84ec8955f219bc2\" returns successfully" Mar 17 18:52:59.165378 kernel: audit: type=1400 audit(1742237579.020:532): avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.020000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.182440 kernel: audit: type=1400 audit(1742237579.020:532): avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.182565 kernel: audit: type=1400 audit(1742237579.020:532): avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.020000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.020000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.217186 kernel: audit: type=1400 audit(1742237579.020:532): avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.020000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.020000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.020000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.020000 audit: BPF prog-id=73 op=LOAD Mar 17 18:52:59.020000 audit[2359]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2042 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:59.020000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134653135313938393936663866353937366461643765666336366265 Mar 17 18:52:59.024000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.024000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.024000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.024000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.024000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.024000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.024000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.024000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.024000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.024000 audit: BPF prog-id=74 op=LOAD Mar 17 18:52:59.024000 audit[2359]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2042 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:59.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134653135313938393936663866353937366461643765666336366265 Mar 17 18:52:59.040000 audit: BPF prog-id=74 op=UNLOAD Mar 17 18:52:59.040000 audit: BPF prog-id=73 op=UNLOAD Mar 17 18:52:59.040000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.040000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.040000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.040000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.040000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.040000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.040000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.040000 audit[2359]: AVC avc: denied { perfmon } for pid=2359 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.040000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.040000 audit[2359]: AVC avc: denied { bpf } for pid=2359 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:52:59.040000 audit: BPF prog-id=75 op=LOAD Mar 17 18:52:59.040000 audit[2359]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2042 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:52:59.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134653135313938393936663866353937366461643765666336366265 Mar 17 18:52:59.228639 kubelet[1993]: E0317 18:52:59.228224 1993 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tj7xp" podUID="e01566be-0dda-44dc-a16f-a31dc9338945" Mar 17 18:52:59.277101 kubelet[1993]: I0317 18:52:59.277018 1993 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-g2f22" podStartSLOduration=8.75586276 podStartE2EDuration="12.27700232s" podCreationTimestamp="2025-03-17 18:52:47 +0000 UTC" firstStartedPulling="2025-03-17 18:52:51.847494262 +0000 UTC m=+6.170507187" lastFinishedPulling="2025-03-17 18:52:55.368633382 +0000 UTC m=+9.691646747" observedRunningTime="2025-03-17 18:52:56.263355976 +0000 UTC m=+10.586368861" watchObservedRunningTime="2025-03-17 18:52:59.27700232 +0000 UTC m=+13.600015205" Mar 17 18:53:00.120766 kubelet[1993]: E0317 18:53:00.120731 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:00.250531 env[1471]: time="2025-03-17T18:53:00.250460890Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Mar 17 18:53:00.252866 systemd[1]: cri-containerd-a4e15198996f8f5976dad7efc66bef94992f9f1980b972e5f84ec8955f219bc2.scope: Deactivated successfully. Mar 17 18:53:00.255000 audit: BPF prog-id=75 op=UNLOAD Mar 17 18:53:00.276136 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a4e15198996f8f5976dad7efc66bef94992f9f1980b972e5f84ec8955f219bc2-rootfs.mount: Deactivated successfully. Mar 17 18:53:00.304775 kubelet[1993]: I0317 18:53:00.304738 1993 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Mar 17 18:53:01.121910 kubelet[1993]: E0317 18:53:01.121857 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:01.233136 systemd[1]: Created slice kubepods-besteffort-pode01566be_0dda_44dc_a16f_a31dc9338945.slice. Mar 17 18:53:01.235429 env[1471]: time="2025-03-17T18:53:01.235386178Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tj7xp,Uid:e01566be-0dda-44dc-a16f-a31dc9338945,Namespace:calico-system,Attempt:0,}" Mar 17 18:53:01.788249 systemd[1]: Created slice kubepods-besteffort-pod3d4df255_7ee3_45b0_b570_9820431dd174.slice. Mar 17 18:53:01.820595 kubelet[1993]: I0317 18:53:01.820559 1993 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zxb6v\" (UniqueName: \"kubernetes.io/projected/3d4df255-7ee3-45b0-b570-9820431dd174-kube-api-access-zxb6v\") pod \"nginx-deployment-8587fbcb89-dvl86\" (UID: \"3d4df255-7ee3-45b0-b570-9820431dd174\") " pod="default/nginx-deployment-8587fbcb89-dvl86" Mar 17 18:53:01.914865 env[1471]: time="2025-03-17T18:53:01.913809101Z" level=info msg="shim disconnected" id=a4e15198996f8f5976dad7efc66bef94992f9f1980b972e5f84ec8955f219bc2 Mar 17 18:53:01.914865 env[1471]: time="2025-03-17T18:53:01.913853744Z" level=warning msg="cleaning up after shim disconnected" id=a4e15198996f8f5976dad7efc66bef94992f9f1980b972e5f84ec8955f219bc2 namespace=k8s.io Mar 17 18:53:01.914865 env[1471]: time="2025-03-17T18:53:01.913862145Z" level=info msg="cleaning up dead shim" Mar 17 18:53:01.920826 env[1471]: time="2025-03-17T18:53:01.920770705Z" level=warning msg="cleanup warnings time=\"2025-03-17T18:53:01Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2399 runtime=io.containerd.runc.v2\n" Mar 17 18:53:02.004161 env[1471]: time="2025-03-17T18:53:02.004091495Z" level=error msg="Failed to destroy network for sandbox \"7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:53:02.005699 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1-shm.mount: Deactivated successfully. Mar 17 18:53:02.007512 env[1471]: time="2025-03-17T18:53:02.006688660Z" level=error msg="encountered an error cleaning up failed sandbox \"7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:53:02.007512 env[1471]: time="2025-03-17T18:53:02.006762106Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tj7xp,Uid:e01566be-0dda-44dc-a16f-a31dc9338945,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:53:02.007667 kubelet[1993]: E0317 18:53:02.006966 1993 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:53:02.007667 kubelet[1993]: E0317 18:53:02.007029 1993 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-tj7xp" Mar 17 18:53:02.007667 kubelet[1993]: E0317 18:53:02.007050 1993 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-tj7xp" Mar 17 18:53:02.007756 kubelet[1993]: E0317 18:53:02.007089 1993 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-tj7xp_calico-system(e01566be-0dda-44dc-a16f-a31dc9338945)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-tj7xp_calico-system(e01566be-0dda-44dc-a16f-a31dc9338945)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-tj7xp" podUID="e01566be-0dda-44dc-a16f-a31dc9338945" Mar 17 18:53:02.091746 env[1471]: time="2025-03-17T18:53:02.091020680Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-dvl86,Uid:3d4df255-7ee3-45b0-b570-9820431dd174,Namespace:default,Attempt:0,}" Mar 17 18:53:02.122411 kubelet[1993]: E0317 18:53:02.122334 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:02.187781 env[1471]: time="2025-03-17T18:53:02.187722877Z" level=error msg="Failed to destroy network for sandbox \"e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:53:02.188102 env[1471]: time="2025-03-17T18:53:02.188066905Z" level=error msg="encountered an error cleaning up failed sandbox \"e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:53:02.188149 env[1471]: time="2025-03-17T18:53:02.188121669Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-dvl86,Uid:3d4df255-7ee3-45b0-b570-9820431dd174,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:53:02.188360 kubelet[1993]: E0317 18:53:02.188323 1993 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:53:02.188413 kubelet[1993]: E0317 18:53:02.188383 1993 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-dvl86" Mar 17 18:53:02.188447 kubelet[1993]: E0317 18:53:02.188408 1993 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8587fbcb89-dvl86" Mar 17 18:53:02.188486 kubelet[1993]: E0317 18:53:02.188465 1993 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8587fbcb89-dvl86_default(3d4df255-7ee3-45b0-b570-9820431dd174)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8587fbcb89-dvl86_default(3d4df255-7ee3-45b0-b570-9820431dd174)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-dvl86" podUID="3d4df255-7ee3-45b0-b570-9820431dd174" Mar 17 18:53:02.257712 kubelet[1993]: I0317 18:53:02.257682 1993 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" Mar 17 18:53:02.258529 env[1471]: time="2025-03-17T18:53:02.258487746Z" level=info msg="StopPodSandbox for \"e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b\"" Mar 17 18:53:02.259805 kubelet[1993]: I0317 18:53:02.259778 1993 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" Mar 17 18:53:02.260331 env[1471]: time="2025-03-17T18:53:02.260297249Z" level=info msg="StopPodSandbox for \"7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1\"" Mar 17 18:53:02.263489 env[1471]: time="2025-03-17T18:53:02.263446978Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Mar 17 18:53:02.295417 env[1471]: time="2025-03-17T18:53:02.295356538Z" level=error msg="StopPodSandbox for \"e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b\" failed" error="failed to destroy network for sandbox \"e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:53:02.296029 kubelet[1993]: E0317 18:53:02.295797 1993 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" Mar 17 18:53:02.296029 kubelet[1993]: E0317 18:53:02.295877 1993 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b"} Mar 17 18:53:02.296029 kubelet[1993]: E0317 18:53:02.295949 1993 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3d4df255-7ee3-45b0-b570-9820431dd174\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 18:53:02.296029 kubelet[1993]: E0317 18:53:02.295971 1993 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3d4df255-7ee3-45b0-b570-9820431dd174\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8587fbcb89-dvl86" podUID="3d4df255-7ee3-45b0-b570-9820431dd174" Mar 17 18:53:02.297134 env[1471]: time="2025-03-17T18:53:02.297095555Z" level=error msg="StopPodSandbox for \"7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1\" failed" error="failed to destroy network for sandbox \"7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Mar 17 18:53:02.297513 kubelet[1993]: E0317 18:53:02.297372 1993 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" Mar 17 18:53:02.297513 kubelet[1993]: E0317 18:53:02.297424 1993 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1"} Mar 17 18:53:02.297513 kubelet[1993]: E0317 18:53:02.297470 1993 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e01566be-0dda-44dc-a16f-a31dc9338945\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Mar 17 18:53:02.297513 kubelet[1993]: E0317 18:53:02.297490 1993 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e01566be-0dda-44dc-a16f-a31dc9338945\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-tj7xp" podUID="e01566be-0dda-44dc-a16f-a31dc9338945" Mar 17 18:53:02.934829 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b-shm.mount: Deactivated successfully. Mar 17 18:53:03.123136 kubelet[1993]: E0317 18:53:03.123091 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:04.123633 kubelet[1993]: E0317 18:53:04.123511 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:05.124040 kubelet[1993]: E0317 18:53:05.124000 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:06.124125 kubelet[1993]: E0317 18:53:06.124074 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:07.108792 kubelet[1993]: E0317 18:53:07.108748 1993 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:07.125225 kubelet[1993]: E0317 18:53:07.125184 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:07.601155 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2314088727.mount: Deactivated successfully. Mar 17 18:53:07.663387 env[1471]: time="2025-03-17T18:53:07.663320043Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:53:07.675116 env[1471]: time="2025-03-17T18:53:07.675073379Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:53:07.684158 env[1471]: time="2025-03-17T18:53:07.684111887Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:53:07.687677 env[1471]: time="2025-03-17T18:53:07.687637011Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:53:07.688206 env[1471]: time="2025-03-17T18:53:07.688175329Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758\"" Mar 17 18:53:07.702111 env[1471]: time="2025-03-17T18:53:07.702065853Z" level=info msg="CreateContainer within sandbox \"cd0ab79546e9259356756d3578c163d75c60a6929d223ab24c5ae6888a3fd83b\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Mar 17 18:53:07.732393 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3382211542.mount: Deactivated successfully. Mar 17 18:53:07.752935 env[1471]: time="2025-03-17T18:53:07.752882901Z" level=info msg="CreateContainer within sandbox \"cd0ab79546e9259356756d3578c163d75c60a6929d223ab24c5ae6888a3fd83b\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"cd1366ce03923385ef2c59b2981234051605292ebb33e142ebe2c742be1e908e\"" Mar 17 18:53:07.753830 env[1471]: time="2025-03-17T18:53:07.753757682Z" level=info msg="StartContainer for \"cd1366ce03923385ef2c59b2981234051605292ebb33e142ebe2c742be1e908e\"" Mar 17 18:53:07.769331 systemd[1]: Started cri-containerd-cd1366ce03923385ef2c59b2981234051605292ebb33e142ebe2c742be1e908e.scope. Mar 17 18:53:07.786000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.792692 kernel: kauditd_printk_skb: 34 callbacks suppressed Mar 17 18:53:07.792788 kernel: audit: type=1400 audit(1742237587.786:538): avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.786000 audit[2525]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2042 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:07.838012 kernel: audit: type=1300 audit(1742237587.786:538): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2042 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:07.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364313336366365303339323333383565663263353962323938313233 Mar 17 18:53:07.862047 kernel: audit: type=1327 audit(1742237587.786:538): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364313336366365303339323333383565663263353962323938313233 Mar 17 18:53:07.786000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.882270 kernel: audit: type=1400 audit(1742237587.786:539): avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.901669 kernel: audit: type=1400 audit(1742237587.786:539): avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.786000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.786000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.921747 kernel: audit: type=1400 audit(1742237587.786:539): avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.786000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.922002 env[1471]: time="2025-03-17T18:53:07.921961841Z" level=info msg="StartContainer for \"cd1366ce03923385ef2c59b2981234051605292ebb33e142ebe2c742be1e908e\" returns successfully" Mar 17 18:53:07.939496 kernel: audit: type=1400 audit(1742237587.786:539): avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.786000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.957171 kernel: audit: type=1400 audit(1742237587.786:539): avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.957241 kernel: audit: type=1400 audit(1742237587.786:539): avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.786000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.786000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.994276 kernel: audit: type=1400 audit(1742237587.786:539): avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.786000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.786000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.786000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.786000 audit: BPF prog-id=76 op=LOAD Mar 17 18:53:07.786000 audit[2525]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2042 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:07.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364313336366365303339323333383565663263353962323938313233 Mar 17 18:53:07.786000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.786000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.786000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.786000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.786000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.786000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.786000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.786000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.786000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.786000 audit: BPF prog-id=77 op=LOAD Mar 17 18:53:07.786000 audit[2525]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2042 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:07.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364313336366365303339323333383565663263353962323938313233 Mar 17 18:53:07.786000 audit: BPF prog-id=77 op=UNLOAD Mar 17 18:53:07.786000 audit: BPF prog-id=76 op=UNLOAD Mar 17 18:53:07.786000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.786000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.786000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.786000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.786000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.786000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.786000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.786000 audit[2525]: AVC avc: denied { perfmon } for pid=2525 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.786000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.786000 audit[2525]: AVC avc: denied { bpf } for pid=2525 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:07.786000 audit: BPF prog-id=78 op=LOAD Mar 17 18:53:07.786000 audit[2525]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2042 pid=2525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:07.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364313336366365303339323333383565663263353962323938313233 Mar 17 18:53:08.127651 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Mar 17 18:53:08.127774 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Mar 17 18:53:08.127836 kubelet[1993]: E0317 18:53:08.126116 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:08.294415 kubelet[1993]: I0317 18:53:08.294338 1993 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-qt6ct" podStartSLOduration=5.44393305 podStartE2EDuration="21.294323265s" podCreationTimestamp="2025-03-17 18:52:47 +0000 UTC" firstStartedPulling="2025-03-17 18:52:51.838950475 +0000 UTC m=+6.161963400" lastFinishedPulling="2025-03-17 18:53:07.68934069 +0000 UTC m=+22.012353615" observedRunningTime="2025-03-17 18:53:08.294039606 +0000 UTC m=+22.617052531" watchObservedRunningTime="2025-03-17 18:53:08.294323265 +0000 UTC m=+22.617336190" Mar 17 18:53:09.127024 kubelet[1993]: E0317 18:53:09.126985 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:09.292005 systemd[1]: run-containerd-runc-k8s.io-cd1366ce03923385ef2c59b2981234051605292ebb33e142ebe2c742be1e908e-runc.kUUwAT.mount: Deactivated successfully. Mar 17 18:53:09.570000 audit[2676]: AVC avc: denied { write } for pid=2676 comm="tee" name="fd" dev="proc" ino=18173 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:53:09.570000 audit[2676]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd7fada19 a2=241 a3=1b6 items=1 ppid=2637 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.570000 audit: CWD cwd="/etc/service/enabled/bird/log" Mar 17 18:53:09.570000 audit: PATH item=0 name="/dev/fd/63" inode=18164 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:53:09.570000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:53:09.584000 audit[2688]: AVC avc: denied { write } for pid=2688 comm="tee" name="fd" dev="proc" ino=18187 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:53:09.586000 audit[2692]: AVC avc: denied { write } for pid=2692 comm="tee" name="fd" dev="proc" ino=18190 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:53:09.587000 audit[2690]: AVC avc: denied { write } for pid=2690 comm="tee" name="fd" dev="proc" ino=18193 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:53:09.587000 audit[2690]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffb519a09 a2=241 a3=1b6 items=1 ppid=2641 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.587000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Mar 17 18:53:09.584000 audit[2688]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe6cdaa08 a2=241 a3=1b6 items=1 ppid=2639 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.587000 audit: PATH item=0 name="/dev/fd/63" inode=18589 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:53:09.587000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:53:09.584000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Mar 17 18:53:09.584000 audit: PATH item=0 name="/dev/fd/63" inode=18588 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:53:09.584000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:53:09.586000 audit[2692]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc2b25a18 a2=241 a3=1b6 items=1 ppid=2652 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.593000 audit[2702]: AVC avc: denied { write } for pid=2702 comm="tee" name="fd" dev="proc" ino=18601 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:53:09.593000 audit[2702]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe679da18 a2=241 a3=1b6 items=1 ppid=2642 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.586000 audit: CWD cwd="/etc/service/enabled/confd/log" Mar 17 18:53:09.586000 audit: PATH item=0 name="/dev/fd/63" inode=18174 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:53:09.586000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:53:09.593000 audit: CWD cwd="/etc/service/enabled/felix/log" Mar 17 18:53:09.593000 audit: PATH item=0 name="/dev/fd/63" inode=18181 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:53:09.593000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:53:09.603000 audit[2707]: AVC avc: denied { write } for pid=2707 comm="tee" name="fd" dev="proc" ino=18605 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:53:09.603000 audit[2707]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffec70fa18 a2=241 a3=1b6 items=1 ppid=2645 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.603000 audit: CWD cwd="/etc/service/enabled/bird6/log" Mar 17 18:53:09.603000 audit: PATH item=0 name="/dev/fd/63" inode=18597 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:53:09.603000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:53:09.603000 audit[2709]: AVC avc: denied { write } for pid=2709 comm="tee" name="fd" dev="proc" ino=18199 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Mar 17 18:53:09.603000 audit[2709]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd87b7a1a a2=241 a3=1b6 items=1 ppid=2646 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.603000 audit: CWD cwd="/etc/service/enabled/cni/log" Mar 17 18:53:09.603000 audit: PATH item=0 name="/dev/fd/63" inode=18598 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:53:09.603000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Mar 17 18:53:09.737000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.737000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.737000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.737000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.737000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.737000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.737000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.737000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.737000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.737000 audit: BPF prog-id=79 op=LOAD Mar 17 18:53:09.737000 audit[2745]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdf216cb8 a2=98 a3=ffffdf216ca8 items=0 ppid=2644 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.737000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:53:09.737000 audit: BPF prog-id=79 op=UNLOAD Mar 17 18:53:09.738000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.738000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.738000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.738000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.738000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.738000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.738000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.738000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.738000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.738000 audit: BPF prog-id=80 op=LOAD Mar 17 18:53:09.738000 audit[2745]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdf216948 a2=74 a3=95 items=0 ppid=2644 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.738000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:53:09.738000 audit: BPF prog-id=80 op=UNLOAD Mar 17 18:53:09.738000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.738000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.738000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.738000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.738000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.738000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.738000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.738000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.738000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.738000 audit: BPF prog-id=81 op=LOAD Mar 17 18:53:09.738000 audit[2745]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdf2169a8 a2=94 a3=2 items=0 ppid=2644 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.738000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:53:09.738000 audit: BPF prog-id=81 op=UNLOAD Mar 17 18:53:09.836000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.836000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.836000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.836000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.836000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.836000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.836000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.836000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.836000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.836000 audit: BPF prog-id=82 op=LOAD Mar 17 18:53:09.836000 audit[2745]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdf216968 a2=40 a3=ffffdf216998 items=0 ppid=2644 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.836000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:53:09.838000 audit: BPF prog-id=82 op=UNLOAD Mar 17 18:53:09.838000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.838000 audit[2745]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffdf216a80 a2=50 a3=0 items=0 ppid=2644 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.838000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:53:09.846000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.846000 audit[2745]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdf2169d8 a2=28 a3=ffffdf216b08 items=0 ppid=2644 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.846000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:53:09.847000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.847000 audit[2745]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdf216a08 a2=28 a3=ffffdf216b38 items=0 ppid=2644 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:53:09.847000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.847000 audit[2745]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdf2168b8 a2=28 a3=ffffdf2169e8 items=0 ppid=2644 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:53:09.847000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.847000 audit[2745]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdf216a28 a2=28 a3=ffffdf216b58 items=0 ppid=2644 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:53:09.847000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.847000 audit[2745]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdf216a08 a2=28 a3=ffffdf216b38 items=0 ppid=2644 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:53:09.847000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.847000 audit[2745]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdf2169f8 a2=28 a3=ffffdf216b28 items=0 ppid=2644 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:53:09.847000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.847000 audit[2745]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdf216a28 a2=28 a3=ffffdf216b58 items=0 ppid=2644 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.847000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:53:09.848000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.848000 audit[2745]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdf216a08 a2=28 a3=ffffdf216b38 items=0 ppid=2644 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.848000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:53:09.848000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.848000 audit[2745]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdf216a28 a2=28 a3=ffffdf216b58 items=0 ppid=2644 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.848000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:53:09.848000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.848000 audit[2745]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffdf2169f8 a2=28 a3=ffffdf216b28 items=0 ppid=2644 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.848000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:53:09.848000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.848000 audit[2745]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdf216a78 a2=28 a3=ffffdf216bb8 items=0 ppid=2644 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.848000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:53:09.848000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.848000 audit[2745]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffdf2167b0 a2=50 a3=0 items=0 ppid=2644 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.848000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:53:09.849000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.849000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.849000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.849000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.849000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.849000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.849000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.849000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.849000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.849000 audit: BPF prog-id=83 op=LOAD Mar 17 18:53:09.849000 audit[2745]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdf2167b8 a2=94 a3=5 items=0 ppid=2644 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.849000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:53:09.849000 audit: BPF prog-id=83 op=UNLOAD Mar 17 18:53:09.849000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.849000 audit[2745]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffdf2168c0 a2=50 a3=0 items=0 ppid=2644 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.849000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:53:09.849000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.849000 audit[2745]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffdf216a08 a2=4 a3=3 items=0 ppid=2644 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.849000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:53:09.850000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.850000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.850000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.850000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.850000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.850000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.850000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.850000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.850000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.850000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.850000 audit[2745]: AVC avc: denied { confidentiality } for pid=2745 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:53:09.850000 audit[2745]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffdf2169e8 a2=94 a3=6 items=0 ppid=2644 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.850000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:53:09.851000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.851000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.851000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.851000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.851000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.851000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.851000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.851000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.851000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.851000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.851000 audit[2745]: AVC avc: denied { confidentiality } for pid=2745 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:53:09.851000 audit[2745]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffdf2161b8 a2=94 a3=83 items=0 ppid=2644 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.851000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:53:09.851000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.851000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.851000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.851000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.851000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.851000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.851000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.851000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.851000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.851000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.851000 audit[2745]: AVC avc: denied { confidentiality } for pid=2745 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:53:09.851000 audit[2745]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffdf2161b8 a2=94 a3=83 items=0 ppid=2644 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.851000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Mar 17 18:53:09.860000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.860000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.860000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.860000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.860000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.860000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.860000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.860000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.860000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.860000 audit: BPF prog-id=84 op=LOAD Mar 17 18:53:09.860000 audit[2748]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc0dab748 a2=98 a3=ffffc0dab738 items=0 ppid=2644 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.860000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 18:53:09.860000 audit: BPF prog-id=84 op=UNLOAD Mar 17 18:53:09.860000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.860000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.860000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.860000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.860000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.860000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.860000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.860000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.860000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.860000 audit: BPF prog-id=85 op=LOAD Mar 17 18:53:09.860000 audit[2748]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc0dab5f8 a2=74 a3=95 items=0 ppid=2644 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.860000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 18:53:09.860000 audit: BPF prog-id=85 op=UNLOAD Mar 17 18:53:09.860000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.860000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.860000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.860000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.860000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.860000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.860000 audit[2748]: AVC avc: denied { perfmon } for pid=2748 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.860000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.860000 audit[2748]: AVC avc: denied { bpf } for pid=2748 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:09.860000 audit: BPF prog-id=86 op=LOAD Mar 17 18:53:09.860000 audit[2748]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc0dab628 a2=40 a3=ffffc0dab658 items=0 ppid=2644 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:09.860000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Mar 17 18:53:09.860000 audit: BPF prog-id=86 op=UNLOAD Mar 17 18:53:09.963281 systemd-networkd[1622]: vxlan.calico: Link UP Mar 17 18:53:09.963288 systemd-networkd[1622]: vxlan.calico: Gained carrier Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit: BPF prog-id=87 op=LOAD Mar 17 18:53:10.005000 audit[2777]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd04297a8 a2=98 a3=ffffd0429798 items=0 ppid=2644 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.005000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:53:10.005000 audit: BPF prog-id=87 op=UNLOAD Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit: BPF prog-id=88 op=LOAD Mar 17 18:53:10.005000 audit[2777]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd0429488 a2=74 a3=95 items=0 ppid=2644 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.005000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:53:10.005000 audit: BPF prog-id=88 op=UNLOAD Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit: BPF prog-id=89 op=LOAD Mar 17 18:53:10.005000 audit[2777]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd04294e8 a2=94 a3=2 items=0 ppid=2644 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.005000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:53:10.005000 audit: BPF prog-id=89 op=UNLOAD Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd0429518 a2=28 a3=ffffd0429648 items=0 ppid=2644 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.005000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd0429548 a2=28 a3=ffffd0429678 items=0 ppid=2644 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.005000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd04293f8 a2=28 a3=ffffd0429528 items=0 ppid=2644 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.005000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd0429568 a2=28 a3=ffffd0429698 items=0 ppid=2644 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.005000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd0429548 a2=28 a3=ffffd0429678 items=0 ppid=2644 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.005000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd0429538 a2=28 a3=ffffd0429668 items=0 ppid=2644 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.005000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd0429568 a2=28 a3=ffffd0429698 items=0 ppid=2644 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.005000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd0429548 a2=28 a3=ffffd0429678 items=0 ppid=2644 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.005000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd0429568 a2=28 a3=ffffd0429698 items=0 ppid=2644 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.005000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd0429538 a2=28 a3=ffffd0429668 items=0 ppid=2644 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.005000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd04295b8 a2=28 a3=ffffd04296f8 items=0 ppid=2644 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.005000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.005000 audit: BPF prog-id=90 op=LOAD Mar 17 18:53:10.005000 audit[2777]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd04293d8 a2=40 a3=ffffd0429408 items=0 ppid=2644 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.005000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:53:10.006000 audit: BPF prog-id=90 op=UNLOAD Mar 17 18:53:10.006000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.006000 audit[2777]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffd0429400 a2=50 a3=0 items=0 ppid=2644 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.006000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:53:10.006000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.006000 audit[2777]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffd0429400 a2=50 a3=0 items=0 ppid=2644 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.006000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:53:10.006000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.006000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.006000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.006000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.006000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.006000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.006000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.006000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.006000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.006000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.006000 audit: BPF prog-id=91 op=LOAD Mar 17 18:53:10.006000 audit[2777]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd0428b68 a2=94 a3=2 items=0 ppid=2644 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.006000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:53:10.006000 audit: BPF prog-id=91 op=UNLOAD Mar 17 18:53:10.006000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.006000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.006000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.006000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.006000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.006000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.006000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.006000 audit[2777]: AVC avc: denied { perfmon } for pid=2777 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.006000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.006000 audit[2777]: AVC avc: denied { bpf } for pid=2777 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.006000 audit: BPF prog-id=92 op=LOAD Mar 17 18:53:10.006000 audit[2777]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd0428cf8 a2=94 a3=2d items=0 ppid=2644 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.006000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Mar 17 18:53:10.011000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.011000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.011000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.011000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.011000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.011000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.011000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.011000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.011000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.011000 audit: BPF prog-id=93 op=LOAD Mar 17 18:53:10.011000 audit[2779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff8e60ea8 a2=98 a3=fffff8e60e98 items=0 ppid=2644 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.011000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:53:10.011000 audit: BPF prog-id=93 op=UNLOAD Mar 17 18:53:10.012000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.012000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.012000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.012000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.012000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.012000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.012000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.012000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.012000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.012000 audit: BPF prog-id=94 op=LOAD Mar 17 18:53:10.012000 audit[2779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff8e60b38 a2=74 a3=95 items=0 ppid=2644 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.012000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:53:10.012000 audit: BPF prog-id=94 op=UNLOAD Mar 17 18:53:10.012000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.012000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.012000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.012000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.012000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.012000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.012000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.012000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.012000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.012000 audit: BPF prog-id=95 op=LOAD Mar 17 18:53:10.012000 audit[2779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff8e60b98 a2=94 a3=2 items=0 ppid=2644 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.012000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:53:10.012000 audit: BPF prog-id=95 op=UNLOAD Mar 17 18:53:10.107000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.107000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.107000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.107000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.107000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.107000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.107000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.107000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.107000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.107000 audit: BPF prog-id=96 op=LOAD Mar 17 18:53:10.107000 audit[2779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffff8e60b58 a2=40 a3=fffff8e60b88 items=0 ppid=2644 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.107000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:53:10.107000 audit: BPF prog-id=96 op=UNLOAD Mar 17 18:53:10.107000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.107000 audit[2779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffff8e60c70 a2=50 a3=0 items=0 ppid=2644 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.107000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:53:10.118000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.118000 audit[2779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff8e60bc8 a2=28 a3=fffff8e60cf8 items=0 ppid=2644 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.118000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff8e60bf8 a2=28 a3=fffff8e60d28 items=0 ppid=2644 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff8e60aa8 a2=28 a3=fffff8e60bd8 items=0 ppid=2644 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff8e60c18 a2=28 a3=fffff8e60d48 items=0 ppid=2644 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff8e60bf8 a2=28 a3=fffff8e60d28 items=0 ppid=2644 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff8e60be8 a2=28 a3=fffff8e60d18 items=0 ppid=2644 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff8e60c18 a2=28 a3=fffff8e60d48 items=0 ppid=2644 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff8e60bf8 a2=28 a3=fffff8e60d28 items=0 ppid=2644 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff8e60c18 a2=28 a3=fffff8e60d48 items=0 ppid=2644 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff8e60be8 a2=28 a3=fffff8e60d18 items=0 ppid=2644 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffff8e60c68 a2=28 a3=fffff8e60da8 items=0 ppid=2644 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff8e609a0 a2=50 a3=0 items=0 ppid=2644 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit: BPF prog-id=97 op=LOAD Mar 17 18:53:10.119000 audit[2779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff8e609a8 a2=94 a3=5 items=0 ppid=2644 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:53:10.119000 audit: BPF prog-id=97 op=UNLOAD Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffff8e60ab0 a2=50 a3=0 items=0 ppid=2644 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffff8e60bf8 a2=4 a3=3 items=0 ppid=2644 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { confidentiality } for pid=2779 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:53:10.119000 audit[2779]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff8e60bd8 a2=94 a3=6 items=0 ppid=2644 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { confidentiality } for pid=2779 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:53:10.119000 audit[2779]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff8e603a8 a2=94 a3=83 items=0 ppid=2644 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: AVC avc: denied { perfmon } for pid=2779 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.119000 audit[2779]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffff8e603a8 a2=94 a3=83 items=0 ppid=2644 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:53:10.120000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.120000 audit[2779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff8e61de8 a2=10 a3=fffff8e61ed8 items=0 ppid=2644 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.120000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:53:10.120000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.120000 audit[2779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff8e61ca8 a2=10 a3=fffff8e61d98 items=0 ppid=2644 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.120000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:53:10.120000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.120000 audit[2779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff8e61c18 a2=10 a3=fffff8e61d98 items=0 ppid=2644 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.120000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:53:10.120000 audit[2779]: AVC avc: denied { bpf } for pid=2779 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:10.120000 audit[2779]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=fffff8e61c18 a2=10 a3=fffff8e61d98 items=0 ppid=2644 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.120000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Mar 17 18:53:10.126000 audit: BPF prog-id=92 op=UNLOAD Mar 17 18:53:10.127757 kubelet[1993]: E0317 18:53:10.127709 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:10.233000 audit[2803]: NETFILTER_CFG table=mangle:68 family=2 entries=16 op=nft_register_chain pid=2803 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:53:10.233000 audit[2803]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffd7e62840 a2=0 a3=ffffa4eaafa8 items=0 ppid=2644 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.233000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:53:10.254000 audit[2807]: NETFILTER_CFG table=nat:69 family=2 entries=15 op=nft_register_chain pid=2807 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:53:10.254000 audit[2807]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffd2fa21b0 a2=0 a3=ffff8265dfa8 items=0 ppid=2644 pid=2807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.254000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:53:10.258000 audit[2804]: NETFILTER_CFG table=raw:70 family=2 entries=21 op=nft_register_chain pid=2804 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:53:10.258000 audit[2804]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffe9857fb0 a2=0 a3=ffff9831dfa8 items=0 ppid=2644 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.258000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:53:10.265000 audit[2805]: NETFILTER_CFG table=filter:71 family=2 entries=39 op=nft_register_chain pid=2805 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:53:10.265000 audit[2805]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=fffff5056f00 a2=0 a3=ffff8831afa8 items=0 ppid=2644 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:10.265000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:53:11.127889 kubelet[1993]: E0317 18:53:11.127831 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:11.172638 systemd-networkd[1622]: vxlan.calico: Gained IPv6LL Mar 17 18:53:12.128198 kubelet[1993]: E0317 18:53:12.128161 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:13.129535 kubelet[1993]: E0317 18:53:13.129484 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:14.130074 kubelet[1993]: E0317 18:53:14.130043 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:14.228439 env[1471]: time="2025-03-17T18:53:14.228034390Z" level=info msg="StopPodSandbox for \"7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1\"" Mar 17 18:53:14.312038 env[1471]: 2025-03-17 18:53:14.277 [INFO][2831] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" Mar 17 18:53:14.312038 env[1471]: 2025-03-17 18:53:14.278 [INFO][2831] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" iface="eth0" netns="/var/run/netns/cni-6fdb3644-e71d-b7d7-3276-bd45093ce6ad" Mar 17 18:53:14.312038 env[1471]: 2025-03-17 18:53:14.278 [INFO][2831] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" iface="eth0" netns="/var/run/netns/cni-6fdb3644-e71d-b7d7-3276-bd45093ce6ad" Mar 17 18:53:14.312038 env[1471]: 2025-03-17 18:53:14.278 [INFO][2831] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" iface="eth0" netns="/var/run/netns/cni-6fdb3644-e71d-b7d7-3276-bd45093ce6ad" Mar 17 18:53:14.312038 env[1471]: 2025-03-17 18:53:14.278 [INFO][2831] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" Mar 17 18:53:14.312038 env[1471]: 2025-03-17 18:53:14.278 [INFO][2831] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" Mar 17 18:53:14.312038 env[1471]: 2025-03-17 18:53:14.296 [INFO][2837] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" HandleID="k8s-pod-network.7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" Workload="10.200.20.21-k8s-csi--node--driver--tj7xp-eth0" Mar 17 18:53:14.312038 env[1471]: 2025-03-17 18:53:14.296 [INFO][2837] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:53:14.312038 env[1471]: 2025-03-17 18:53:14.296 [INFO][2837] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:53:14.312038 env[1471]: 2025-03-17 18:53:14.307 [WARNING][2837] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" HandleID="k8s-pod-network.7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" Workload="10.200.20.21-k8s-csi--node--driver--tj7xp-eth0" Mar 17 18:53:14.312038 env[1471]: 2025-03-17 18:53:14.307 [INFO][2837] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" HandleID="k8s-pod-network.7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" Workload="10.200.20.21-k8s-csi--node--driver--tj7xp-eth0" Mar 17 18:53:14.312038 env[1471]: 2025-03-17 18:53:14.309 [INFO][2837] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:53:14.312038 env[1471]: 2025-03-17 18:53:14.310 [INFO][2831] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" Mar 17 18:53:14.313795 systemd[1]: run-netns-cni\x2d6fdb3644\x2de71d\x2db7d7\x2d3276\x2dbd45093ce6ad.mount: Deactivated successfully. Mar 17 18:53:14.314446 env[1471]: time="2025-03-17T18:53:14.314409992Z" level=info msg="TearDown network for sandbox \"7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1\" successfully" Mar 17 18:53:14.314568 env[1471]: time="2025-03-17T18:53:14.314550920Z" level=info msg="StopPodSandbox for \"7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1\" returns successfully" Mar 17 18:53:14.315463 env[1471]: time="2025-03-17T18:53:14.315425772Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tj7xp,Uid:e01566be-0dda-44dc-a16f-a31dc9338945,Namespace:calico-system,Attempt:1,}" Mar 17 18:53:14.496901 systemd-networkd[1622]: calid20865a8b4e: Link UP Mar 17 18:53:14.511131 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 18:53:14.511264 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid20865a8b4e: link becomes ready Mar 17 18:53:14.511697 systemd-networkd[1622]: calid20865a8b4e: Gained carrier Mar 17 18:53:14.528148 env[1471]: 2025-03-17 18:53:14.412 [INFO][2843] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.21-k8s-csi--node--driver--tj7xp-eth0 csi-node-driver- calico-system e01566be-0dda-44dc-a16f-a31dc9338945 1258 0 2025-03-17 18:52:47 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:56747c9949 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s 10.200.20.21 csi-node-driver-tj7xp eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calid20865a8b4e [] []}} ContainerID="c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c" Namespace="calico-system" Pod="csi-node-driver-tj7xp" WorkloadEndpoint="10.200.20.21-k8s-csi--node--driver--tj7xp-" Mar 17 18:53:14.528148 env[1471]: 2025-03-17 18:53:14.412 [INFO][2843] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c" Namespace="calico-system" Pod="csi-node-driver-tj7xp" WorkloadEndpoint="10.200.20.21-k8s-csi--node--driver--tj7xp-eth0" Mar 17 18:53:14.528148 env[1471]: 2025-03-17 18:53:14.437 [INFO][2855] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c" HandleID="k8s-pod-network.c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c" Workload="10.200.20.21-k8s-csi--node--driver--tj7xp-eth0" Mar 17 18:53:14.528148 env[1471]: 2025-03-17 18:53:14.453 [INFO][2855] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c" HandleID="k8s-pod-network.c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c" Workload="10.200.20.21-k8s-csi--node--driver--tj7xp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003174f0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.20.21", "pod":"csi-node-driver-tj7xp", "timestamp":"2025-03-17 18:53:14.437631745 +0000 UTC"}, Hostname:"10.200.20.21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:53:14.528148 env[1471]: 2025-03-17 18:53:14.453 [INFO][2855] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:53:14.528148 env[1471]: 2025-03-17 18:53:14.453 [INFO][2855] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:53:14.528148 env[1471]: 2025-03-17 18:53:14.453 [INFO][2855] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.21' Mar 17 18:53:14.528148 env[1471]: 2025-03-17 18:53:14.456 [INFO][2855] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c" host="10.200.20.21" Mar 17 18:53:14.528148 env[1471]: 2025-03-17 18:53:14.460 [INFO][2855] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.20.21" Mar 17 18:53:14.528148 env[1471]: 2025-03-17 18:53:14.465 [INFO][2855] ipam/ipam.go 489: Trying affinity for 192.168.45.64/26 host="10.200.20.21" Mar 17 18:53:14.528148 env[1471]: 2025-03-17 18:53:14.467 [INFO][2855] ipam/ipam.go 155: Attempting to load block cidr=192.168.45.64/26 host="10.200.20.21" Mar 17 18:53:14.528148 env[1471]: 2025-03-17 18:53:14.469 [INFO][2855] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.45.64/26 host="10.200.20.21" Mar 17 18:53:14.528148 env[1471]: 2025-03-17 18:53:14.469 [INFO][2855] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.45.64/26 handle="k8s-pod-network.c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c" host="10.200.20.21" Mar 17 18:53:14.528148 env[1471]: 2025-03-17 18:53:14.471 [INFO][2855] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c Mar 17 18:53:14.528148 env[1471]: 2025-03-17 18:53:14.477 [INFO][2855] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.45.64/26 handle="k8s-pod-network.c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c" host="10.200.20.21" Mar 17 18:53:14.528148 env[1471]: 2025-03-17 18:53:14.485 [INFO][2855] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.45.65/26] block=192.168.45.64/26 handle="k8s-pod-network.c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c" host="10.200.20.21" Mar 17 18:53:14.528148 env[1471]: 2025-03-17 18:53:14.485 [INFO][2855] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.45.65/26] handle="k8s-pod-network.c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c" host="10.200.20.21" Mar 17 18:53:14.528148 env[1471]: 2025-03-17 18:53:14.485 [INFO][2855] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:53:14.528148 env[1471]: 2025-03-17 18:53:14.485 [INFO][2855] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.45.65/26] IPv6=[] ContainerID="c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c" HandleID="k8s-pod-network.c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c" Workload="10.200.20.21-k8s-csi--node--driver--tj7xp-eth0" Mar 17 18:53:14.528808 env[1471]: 2025-03-17 18:53:14.487 [INFO][2843] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c" Namespace="calico-system" Pod="csi-node-driver-tj7xp" WorkloadEndpoint="10.200.20.21-k8s-csi--node--driver--tj7xp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.21-k8s-csi--node--driver--tj7xp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e01566be-0dda-44dc-a16f-a31dc9338945", ResourceVersion:"1258", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 52, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.21", ContainerID:"", Pod:"csi-node-driver-tj7xp", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.45.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid20865a8b4e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:53:14.528808 env[1471]: 2025-03-17 18:53:14.487 [INFO][2843] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.45.65/32] ContainerID="c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c" Namespace="calico-system" Pod="csi-node-driver-tj7xp" WorkloadEndpoint="10.200.20.21-k8s-csi--node--driver--tj7xp-eth0" Mar 17 18:53:14.528808 env[1471]: 2025-03-17 18:53:14.487 [INFO][2843] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid20865a8b4e ContainerID="c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c" Namespace="calico-system" Pod="csi-node-driver-tj7xp" WorkloadEndpoint="10.200.20.21-k8s-csi--node--driver--tj7xp-eth0" Mar 17 18:53:14.528808 env[1471]: 2025-03-17 18:53:14.512 [INFO][2843] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c" Namespace="calico-system" Pod="csi-node-driver-tj7xp" WorkloadEndpoint="10.200.20.21-k8s-csi--node--driver--tj7xp-eth0" Mar 17 18:53:14.528808 env[1471]: 2025-03-17 18:53:14.512 [INFO][2843] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c" Namespace="calico-system" Pod="csi-node-driver-tj7xp" WorkloadEndpoint="10.200.20.21-k8s-csi--node--driver--tj7xp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.21-k8s-csi--node--driver--tj7xp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e01566be-0dda-44dc-a16f-a31dc9338945", ResourceVersion:"1258", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 52, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.21", ContainerID:"c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c", Pod:"csi-node-driver-tj7xp", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.45.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid20865a8b4e", MAC:"5e:fa:77:c7:41:08", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:53:14.528808 env[1471]: 2025-03-17 18:53:14.526 [INFO][2843] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c" Namespace="calico-system" Pod="csi-node-driver-tj7xp" WorkloadEndpoint="10.200.20.21-k8s-csi--node--driver--tj7xp-eth0" Mar 17 18:53:14.535000 audit[2872]: NETFILTER_CFG table=filter:72 family=2 entries=34 op=nft_register_chain pid=2872 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:53:14.542389 kernel: kauditd_printk_skb: 554 callbacks suppressed Mar 17 18:53:14.542560 kernel: audit: type=1325 audit(1742237594.535:646): table=filter:72 family=2 entries=34 op=nft_register_chain pid=2872 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:53:14.535000 audit[2872]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffdf092260 a2=0 a3=ffff96fadfa8 items=0 ppid=2644 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:14.583157 kernel: audit: type=1300 audit(1742237594.535:646): arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffdf092260 a2=0 a3=ffff96fadfa8 items=0 ppid=2644 pid=2872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:14.535000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:53:14.598844 kernel: audit: type=1327 audit(1742237594.535:646): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:53:14.598986 env[1471]: time="2025-03-17T18:53:14.591096904Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:53:14.598986 env[1471]: time="2025-03-17T18:53:14.591133946Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:53:14.598986 env[1471]: time="2025-03-17T18:53:14.591144067Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:53:14.598986 env[1471]: time="2025-03-17T18:53:14.591358999Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c pid=2884 runtime=io.containerd.runc.v2 Mar 17 18:53:14.616916 systemd[1]: Started cri-containerd-c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c.scope. Mar 17 18:53:14.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.664006 kernel: audit: type=1400 audit(1742237594.628:647): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.664101 kernel: audit: type=1400 audit(1742237594.628:648): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.680731 kernel: audit: type=1400 audit(1742237594.628:649): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.697480 kernel: audit: type=1400 audit(1742237594.628:650): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.714605 kernel: audit: type=1400 audit(1742237594.628:651): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.732364 kernel: audit: type=1400 audit(1742237594.628:652): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.749638 kernel: audit: type=1400 audit(1742237594.628:653): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.749788 env[1471]: time="2025-03-17T18:53:14.740521947Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tj7xp,Uid:e01566be-0dda-44dc-a16f-a31dc9338945,Namespace:calico-system,Attempt:1,} returns sandbox id \"c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c\"" Mar 17 18:53:14.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.628000 audit: BPF prog-id=98 op=LOAD Mar 17 18:53:14.634000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.634000 audit[2896]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2884 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:14.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332313531383236373539663237616435323761633830646130376663 Mar 17 18:53:14.634000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.634000 audit[2896]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2884 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:14.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332313531383236373539663237616435323761633830646130376663 Mar 17 18:53:14.634000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.634000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.634000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.634000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.634000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.634000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.634000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.634000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.634000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.634000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.634000 audit: BPF prog-id=99 op=LOAD Mar 17 18:53:14.634000 audit[2896]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2884 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:14.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332313531383236373539663237616435323761633830646130376663 Mar 17 18:53:14.646000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.646000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.646000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.646000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.646000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.646000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.646000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.646000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.646000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.646000 audit: BPF prog-id=100 op=LOAD Mar 17 18:53:14.646000 audit[2896]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2884 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:14.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332313531383236373539663237616435323761633830646130376663 Mar 17 18:53:14.663000 audit: BPF prog-id=100 op=UNLOAD Mar 17 18:53:14.663000 audit: BPF prog-id=99 op=UNLOAD Mar 17 18:53:14.663000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.663000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.663000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.663000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.663000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.663000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.663000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.663000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.663000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.663000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:14.663000 audit: BPF prog-id=101 op=LOAD Mar 17 18:53:14.663000 audit[2896]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2884 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:14.663000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332313531383236373539663237616435323761633830646130376663 Mar 17 18:53:14.753646 env[1471]: time="2025-03-17T18:53:14.753612511Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Mar 17 18:53:15.131031 kubelet[1993]: E0317 18:53:15.130922 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:15.228719 env[1471]: time="2025-03-17T18:53:15.228326547Z" level=info msg="StopPodSandbox for \"e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b\"" Mar 17 18:53:15.314011 systemd[1]: run-containerd-runc-k8s.io-c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c-runc.VCv8QC.mount: Deactivated successfully. Mar 17 18:53:15.322336 env[1471]: 2025-03-17 18:53:15.276 [INFO][2932] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" Mar 17 18:53:15.322336 env[1471]: 2025-03-17 18:53:15.277 [INFO][2932] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" iface="eth0" netns="/var/run/netns/cni-24292e26-748c-ade5-ec70-6de58983bb3b" Mar 17 18:53:15.322336 env[1471]: 2025-03-17 18:53:15.277 [INFO][2932] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" iface="eth0" netns="/var/run/netns/cni-24292e26-748c-ade5-ec70-6de58983bb3b" Mar 17 18:53:15.322336 env[1471]: 2025-03-17 18:53:15.277 [INFO][2932] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" iface="eth0" netns="/var/run/netns/cni-24292e26-748c-ade5-ec70-6de58983bb3b" Mar 17 18:53:15.322336 env[1471]: 2025-03-17 18:53:15.277 [INFO][2932] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" Mar 17 18:53:15.322336 env[1471]: 2025-03-17 18:53:15.277 [INFO][2932] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" Mar 17 18:53:15.322336 env[1471]: 2025-03-17 18:53:15.299 [INFO][2944] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" HandleID="k8s-pod-network.e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" Workload="10.200.20.21-k8s-nginx--deployment--8587fbcb89--dvl86-eth0" Mar 17 18:53:15.322336 env[1471]: 2025-03-17 18:53:15.299 [INFO][2944] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:53:15.322336 env[1471]: 2025-03-17 18:53:15.299 [INFO][2944] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:53:15.322336 env[1471]: 2025-03-17 18:53:15.317 [WARNING][2944] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" HandleID="k8s-pod-network.e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" Workload="10.200.20.21-k8s-nginx--deployment--8587fbcb89--dvl86-eth0" Mar 17 18:53:15.322336 env[1471]: 2025-03-17 18:53:15.318 [INFO][2944] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" HandleID="k8s-pod-network.e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" Workload="10.200.20.21-k8s-nginx--deployment--8587fbcb89--dvl86-eth0" Mar 17 18:53:15.322336 env[1471]: 2025-03-17 18:53:15.320 [INFO][2944] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:53:15.322336 env[1471]: 2025-03-17 18:53:15.321 [INFO][2932] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" Mar 17 18:53:15.324662 systemd[1]: run-netns-cni\x2d24292e26\x2d748c\x2dade5\x2dec70\x2d6de58983bb3b.mount: Deactivated successfully. Mar 17 18:53:15.325493 env[1471]: time="2025-03-17T18:53:15.325406840Z" level=info msg="TearDown network for sandbox \"e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b\" successfully" Mar 17 18:53:15.325593 env[1471]: time="2025-03-17T18:53:15.325575969Z" level=info msg="StopPodSandbox for \"e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b\" returns successfully" Mar 17 18:53:15.326284 env[1471]: time="2025-03-17T18:53:15.326256928Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-dvl86,Uid:3d4df255-7ee3-45b0-b570-9820431dd174,Namespace:default,Attempt:1,}" Mar 17 18:53:15.509139 systemd-networkd[1622]: cali7ae62a5b1e0: Link UP Mar 17 18:53:15.521683 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 18:53:15.521795 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7ae62a5b1e0: link becomes ready Mar 17 18:53:15.524436 systemd-networkd[1622]: cali7ae62a5b1e0: Gained carrier Mar 17 18:53:15.548554 env[1471]: 2025-03-17 18:53:15.425 [INFO][2950] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.21-k8s-nginx--deployment--8587fbcb89--dvl86-eth0 nginx-deployment-8587fbcb89- default 3d4df255-7ee3-45b0-b570-9820431dd174 1266 0 2025-03-17 18:53:01 +0000 UTC map[app:nginx pod-template-hash:8587fbcb89 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.21 nginx-deployment-8587fbcb89-dvl86 eth0 default [] [] [kns.default ksa.default.default] cali7ae62a5b1e0 [] []}} ContainerID="3832eed696f2e80d222089fd94581fe26f13f4098d1005bc0c5fe5df4ce285ac" Namespace="default" Pod="nginx-deployment-8587fbcb89-dvl86" WorkloadEndpoint="10.200.20.21-k8s-nginx--deployment--8587fbcb89--dvl86-" Mar 17 18:53:15.548554 env[1471]: 2025-03-17 18:53:15.425 [INFO][2950] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3832eed696f2e80d222089fd94581fe26f13f4098d1005bc0c5fe5df4ce285ac" Namespace="default" Pod="nginx-deployment-8587fbcb89-dvl86" WorkloadEndpoint="10.200.20.21-k8s-nginx--deployment--8587fbcb89--dvl86-eth0" Mar 17 18:53:15.548554 env[1471]: 2025-03-17 18:53:15.453 [INFO][2962] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3832eed696f2e80d222089fd94581fe26f13f4098d1005bc0c5fe5df4ce285ac" HandleID="k8s-pod-network.3832eed696f2e80d222089fd94581fe26f13f4098d1005bc0c5fe5df4ce285ac" Workload="10.200.20.21-k8s-nginx--deployment--8587fbcb89--dvl86-eth0" Mar 17 18:53:15.548554 env[1471]: 2025-03-17 18:53:15.468 [INFO][2962] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="3832eed696f2e80d222089fd94581fe26f13f4098d1005bc0c5fe5df4ce285ac" HandleID="k8s-pod-network.3832eed696f2e80d222089fd94581fe26f13f4098d1005bc0c5fe5df4ce285ac" Workload="10.200.20.21-k8s-nginx--deployment--8587fbcb89--dvl86-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003ba480), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.21", "pod":"nginx-deployment-8587fbcb89-dvl86", "timestamp":"2025-03-17 18:53:15.453890962 +0000 UTC"}, Hostname:"10.200.20.21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:53:15.548554 env[1471]: 2025-03-17 18:53:15.468 [INFO][2962] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:53:15.548554 env[1471]: 2025-03-17 18:53:15.468 [INFO][2962] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:53:15.548554 env[1471]: 2025-03-17 18:53:15.468 [INFO][2962] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.21' Mar 17 18:53:15.548554 env[1471]: 2025-03-17 18:53:15.471 [INFO][2962] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3832eed696f2e80d222089fd94581fe26f13f4098d1005bc0c5fe5df4ce285ac" host="10.200.20.21" Mar 17 18:53:15.548554 env[1471]: 2025-03-17 18:53:15.475 [INFO][2962] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.20.21" Mar 17 18:53:15.548554 env[1471]: 2025-03-17 18:53:15.481 [INFO][2962] ipam/ipam.go 489: Trying affinity for 192.168.45.64/26 host="10.200.20.21" Mar 17 18:53:15.548554 env[1471]: 2025-03-17 18:53:15.484 [INFO][2962] ipam/ipam.go 155: Attempting to load block cidr=192.168.45.64/26 host="10.200.20.21" Mar 17 18:53:15.548554 env[1471]: 2025-03-17 18:53:15.487 [INFO][2962] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.45.64/26 host="10.200.20.21" Mar 17 18:53:15.548554 env[1471]: 2025-03-17 18:53:15.487 [INFO][2962] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.45.64/26 handle="k8s-pod-network.3832eed696f2e80d222089fd94581fe26f13f4098d1005bc0c5fe5df4ce285ac" host="10.200.20.21" Mar 17 18:53:15.548554 env[1471]: 2025-03-17 18:53:15.489 [INFO][2962] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.3832eed696f2e80d222089fd94581fe26f13f4098d1005bc0c5fe5df4ce285ac Mar 17 18:53:15.548554 env[1471]: 2025-03-17 18:53:15.494 [INFO][2962] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.45.64/26 handle="k8s-pod-network.3832eed696f2e80d222089fd94581fe26f13f4098d1005bc0c5fe5df4ce285ac" host="10.200.20.21" Mar 17 18:53:15.548554 env[1471]: 2025-03-17 18:53:15.504 [INFO][2962] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.45.66/26] block=192.168.45.64/26 handle="k8s-pod-network.3832eed696f2e80d222089fd94581fe26f13f4098d1005bc0c5fe5df4ce285ac" host="10.200.20.21" Mar 17 18:53:15.548554 env[1471]: 2025-03-17 18:53:15.504 [INFO][2962] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.45.66/26] handle="k8s-pod-network.3832eed696f2e80d222089fd94581fe26f13f4098d1005bc0c5fe5df4ce285ac" host="10.200.20.21" Mar 17 18:53:15.548554 env[1471]: 2025-03-17 18:53:15.504 [INFO][2962] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:53:15.548554 env[1471]: 2025-03-17 18:53:15.504 [INFO][2962] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.45.66/26] IPv6=[] ContainerID="3832eed696f2e80d222089fd94581fe26f13f4098d1005bc0c5fe5df4ce285ac" HandleID="k8s-pod-network.3832eed696f2e80d222089fd94581fe26f13f4098d1005bc0c5fe5df4ce285ac" Workload="10.200.20.21-k8s-nginx--deployment--8587fbcb89--dvl86-eth0" Mar 17 18:53:15.549116 env[1471]: 2025-03-17 18:53:15.506 [INFO][2950] cni-plugin/k8s.go 386: Populated endpoint ContainerID="3832eed696f2e80d222089fd94581fe26f13f4098d1005bc0c5fe5df4ce285ac" Namespace="default" Pod="nginx-deployment-8587fbcb89-dvl86" WorkloadEndpoint="10.200.20.21-k8s-nginx--deployment--8587fbcb89--dvl86-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.21-k8s-nginx--deployment--8587fbcb89--dvl86-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"3d4df255-7ee3-45b0-b570-9820431dd174", ResourceVersion:"1266", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 53, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.21", ContainerID:"", Pod:"nginx-deployment-8587fbcb89-dvl86", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.45.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali7ae62a5b1e0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:53:15.549116 env[1471]: 2025-03-17 18:53:15.506 [INFO][2950] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.45.66/32] ContainerID="3832eed696f2e80d222089fd94581fe26f13f4098d1005bc0c5fe5df4ce285ac" Namespace="default" Pod="nginx-deployment-8587fbcb89-dvl86" WorkloadEndpoint="10.200.20.21-k8s-nginx--deployment--8587fbcb89--dvl86-eth0" Mar 17 18:53:15.549116 env[1471]: 2025-03-17 18:53:15.506 [INFO][2950] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7ae62a5b1e0 ContainerID="3832eed696f2e80d222089fd94581fe26f13f4098d1005bc0c5fe5df4ce285ac" Namespace="default" Pod="nginx-deployment-8587fbcb89-dvl86" WorkloadEndpoint="10.200.20.21-k8s-nginx--deployment--8587fbcb89--dvl86-eth0" Mar 17 18:53:15.549116 env[1471]: 2025-03-17 18:53:15.524 [INFO][2950] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="3832eed696f2e80d222089fd94581fe26f13f4098d1005bc0c5fe5df4ce285ac" Namespace="default" Pod="nginx-deployment-8587fbcb89-dvl86" WorkloadEndpoint="10.200.20.21-k8s-nginx--deployment--8587fbcb89--dvl86-eth0" Mar 17 18:53:15.549116 env[1471]: 2025-03-17 18:53:15.525 [INFO][2950] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3832eed696f2e80d222089fd94581fe26f13f4098d1005bc0c5fe5df4ce285ac" Namespace="default" Pod="nginx-deployment-8587fbcb89-dvl86" WorkloadEndpoint="10.200.20.21-k8s-nginx--deployment--8587fbcb89--dvl86-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.21-k8s-nginx--deployment--8587fbcb89--dvl86-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"3d4df255-7ee3-45b0-b570-9820431dd174", ResourceVersion:"1266", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 53, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.21", ContainerID:"3832eed696f2e80d222089fd94581fe26f13f4098d1005bc0c5fe5df4ce285ac", Pod:"nginx-deployment-8587fbcb89-dvl86", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.45.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali7ae62a5b1e0", MAC:"02:d4:7e:fe:a4:30", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:53:15.549116 env[1471]: 2025-03-17 18:53:15.547 [INFO][2950] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="3832eed696f2e80d222089fd94581fe26f13f4098d1005bc0c5fe5df4ce285ac" Namespace="default" Pod="nginx-deployment-8587fbcb89-dvl86" WorkloadEndpoint="10.200.20.21-k8s-nginx--deployment--8587fbcb89--dvl86-eth0" Mar 17 18:53:15.558000 audit[2982]: NETFILTER_CFG table=filter:73 family=2 entries=38 op=nft_register_chain pid=2982 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:53:15.558000 audit[2982]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20312 a0=3 a1=ffffefb93a60 a2=0 a3=ffff89b55fa8 items=0 ppid=2644 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:15.558000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:53:15.567294 env[1471]: time="2025-03-17T18:53:15.567217660Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:53:15.567294 env[1471]: time="2025-03-17T18:53:15.567268503Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:53:15.567525 env[1471]: time="2025-03-17T18:53:15.567488235Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:53:15.567800 env[1471]: time="2025-03-17T18:53:15.567737449Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3832eed696f2e80d222089fd94581fe26f13f4098d1005bc0c5fe5df4ce285ac pid=2990 runtime=io.containerd.runc.v2 Mar 17 18:53:15.581606 systemd[1]: Started cri-containerd-3832eed696f2e80d222089fd94581fe26f13f4098d1005bc0c5fe5df4ce285ac.scope. Mar 17 18:53:15.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.596000 audit: BPF prog-id=102 op=LOAD Mar 17 18:53:15.596000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.596000 audit[3000]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2990 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:15.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338333265656436393666326538306432323230383966643934353831 Mar 17 18:53:15.597000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.597000 audit[3000]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2990 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:15.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338333265656436393666326538306432323230383966643934353831 Mar 17 18:53:15.597000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.597000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.597000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.597000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.597000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.597000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.597000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.597000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.597000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.597000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.597000 audit: BPF prog-id=103 op=LOAD Mar 17 18:53:15.597000 audit[3000]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2990 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:15.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338333265656436393666326538306432323230383966643934353831 Mar 17 18:53:15.598000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.598000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.598000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.598000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.598000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.598000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.598000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.598000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.598000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.598000 audit: BPF prog-id=104 op=LOAD Mar 17 18:53:15.598000 audit[3000]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2990 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:15.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338333265656436393666326538306432323230383966643934353831 Mar 17 18:53:15.598000 audit: BPF prog-id=104 op=UNLOAD Mar 17 18:53:15.598000 audit: BPF prog-id=103 op=UNLOAD Mar 17 18:53:15.599000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.599000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.599000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.599000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.599000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.599000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.599000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.599000 audit[3000]: AVC avc: denied { perfmon } for pid=3000 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.599000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.599000 audit[3000]: AVC avc: denied { bpf } for pid=3000 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:15.599000 audit: BPF prog-id=105 op=LOAD Mar 17 18:53:15.599000 audit[3000]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2990 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:15.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338333265656436393666326538306432323230383966643934353831 Mar 17 18:53:15.623843 env[1471]: time="2025-03-17T18:53:15.623798684Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8587fbcb89-dvl86,Uid:3d4df255-7ee3-45b0-b570-9820431dd174,Namespace:default,Attempt:1,} returns sandbox id \"3832eed696f2e80d222089fd94581fe26f13f4098d1005bc0c5fe5df4ce285ac\"" Mar 17 18:53:16.116099 env[1471]: time="2025-03-17T18:53:16.116030301Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:53:16.125663 env[1471]: time="2025-03-17T18:53:16.125615554Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:53:16.131614 env[1471]: time="2025-03-17T18:53:16.131572125Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:53:16.131891 kubelet[1993]: E0317 18:53:16.131854 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:16.148275 env[1471]: time="2025-03-17T18:53:16.148225532Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:53:16.148537 env[1471]: time="2025-03-17T18:53:16.148510988Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163\"" Mar 17 18:53:16.150326 env[1471]: time="2025-03-17T18:53:16.150295447Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Mar 17 18:53:16.151227 env[1471]: time="2025-03-17T18:53:16.151200298Z" level=info msg="CreateContainer within sandbox \"c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Mar 17 18:53:16.228583 systemd-networkd[1622]: calid20865a8b4e: Gained IPv6LL Mar 17 18:53:16.236374 env[1471]: time="2025-03-17T18:53:16.236333955Z" level=info msg="CreateContainer within sandbox \"c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"03f6399d1e438ba20bb8761b54e50ecb57575aa99d9a20ea823bf88e98f8f5ac\"" Mar 17 18:53:16.237379 env[1471]: time="2025-03-17T18:53:16.237354211Z" level=info msg="StartContainer for \"03f6399d1e438ba20bb8761b54e50ecb57575aa99d9a20ea823bf88e98f8f5ac\"" Mar 17 18:53:16.252122 systemd[1]: Started cri-containerd-03f6399d1e438ba20bb8761b54e50ecb57575aa99d9a20ea823bf88e98f8f5ac.scope. Mar 17 18:53:16.265000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:16.265000 audit[3033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2884 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:16.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033663633393964316534333862613230626238373631623534653530 Mar 17 18:53:16.265000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:16.265000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:16.265000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:16.265000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:16.265000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:16.265000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:16.265000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:16.265000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:16.265000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:16.265000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:16.265000 audit: BPF prog-id=106 op=LOAD Mar 17 18:53:16.265000 audit[3033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2884 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:16.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033663633393964316534333862613230626238373631623534653530 Mar 17 18:53:16.265000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:16.265000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:16.265000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:16.265000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:16.265000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:16.265000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:16.265000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:16.265000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:16.265000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:16.265000 audit: BPF prog-id=107 op=LOAD Mar 17 18:53:16.265000 audit[3033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2884 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:16.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033663633393964316534333862613230626238373631623534653530 Mar 17 18:53:16.265000 audit: BPF prog-id=107 op=UNLOAD Mar 17 18:53:16.265000 audit: BPF prog-id=106 op=UNLOAD Mar 17 18:53:16.265000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:16.265000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:16.265000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:16.265000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:16.265000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:16.265000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:16.265000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:16.265000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:16.265000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:16.265000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:16.265000 audit: BPF prog-id=108 op=LOAD Mar 17 18:53:16.265000 audit[3033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2884 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:16.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033663633393964316534333862613230626238373631623534653530 Mar 17 18:53:16.286504 env[1471]: time="2025-03-17T18:53:16.286444943Z" level=info msg="StartContainer for \"03f6399d1e438ba20bb8761b54e50ecb57575aa99d9a20ea823bf88e98f8f5ac\" returns successfully" Mar 17 18:53:16.676710 systemd-networkd[1622]: cali7ae62a5b1e0: Gained IPv6LL Mar 17 18:53:17.132711 kubelet[1993]: E0317 18:53:17.132670 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:18.132918 kubelet[1993]: E0317 18:53:18.132877 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:18.799300 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3533893091.mount: Deactivated successfully. Mar 17 18:53:19.133828 kubelet[1993]: E0317 18:53:19.133627 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:20.134518 kubelet[1993]: E0317 18:53:20.134470 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:20.188978 env[1471]: time="2025-03-17T18:53:20.188925936Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:53:20.197434 env[1471]: time="2025-03-17T18:53:20.197369884Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f660a383148a8217a75a455efeb8bfd4cbe3afa737712cc0e25f27c03b770dd4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:53:20.202024 env[1471]: time="2025-03-17T18:53:20.201980237Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:53:20.206951 env[1471]: time="2025-03-17T18:53:20.206912807Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:b927c62cc716b99bce51774b46a63feb63f5414c6f985fb80cacd1933bbd0e06,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:53:20.207579 env[1471]: time="2025-03-17T18:53:20.207547599Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:f660a383148a8217a75a455efeb8bfd4cbe3afa737712cc0e25f27c03b770dd4\"" Mar 17 18:53:20.209801 env[1471]: time="2025-03-17T18:53:20.209769272Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Mar 17 18:53:20.210619 env[1471]: time="2025-03-17T18:53:20.210593274Z" level=info msg="CreateContainer within sandbox \"3832eed696f2e80d222089fd94581fe26f13f4098d1005bc0c5fe5df4ce285ac\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Mar 17 18:53:20.246647 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2710856873.mount: Deactivated successfully. Mar 17 18:53:20.268652 env[1471]: time="2025-03-17T18:53:20.268605733Z" level=info msg="CreateContainer within sandbox \"3832eed696f2e80d222089fd94581fe26f13f4098d1005bc0c5fe5df4ce285ac\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"ac4d2733594adf4a6cb1c5f6d8e7afb4c8228676411f6b4ec787aa52dc125574\"" Mar 17 18:53:20.269287 env[1471]: time="2025-03-17T18:53:20.269262526Z" level=info msg="StartContainer for \"ac4d2733594adf4a6cb1c5f6d8e7afb4c8228676411f6b4ec787aa52dc125574\"" Mar 17 18:53:20.284380 systemd[1]: Started cri-containerd-ac4d2733594adf4a6cb1c5f6d8e7afb4c8228676411f6b4ec787aa52dc125574.scope. Mar 17 18:53:20.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.305774 kernel: kauditd_printk_skb: 153 callbacks suppressed Mar 17 18:53:20.305889 kernel: audit: type=1400 audit(1742237600.298:690): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.338726 kernel: audit: type=1400 audit(1742237600.298:691): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.339079 kernel: audit: type=1400 audit(1742237600.298:692): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.372043 kernel: audit: type=1400 audit(1742237600.298:693): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.389409 kernel: audit: type=1400 audit(1742237600.298:694): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.407074 kernel: audit: type=1400 audit(1742237600.298:695): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.425390 kernel: audit: type=1400 audit(1742237600.298:696): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.298000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.443004 kernel: audit: type=1400 audit(1742237600.298:697): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.462708 kernel: audit: type=1400 audit(1742237600.298:698): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.298000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.480374 kernel: audit: type=1400 audit(1742237600.298:699): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.299000 audit: BPF prog-id=109 op=LOAD Mar 17 18:53:20.300000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.300000 audit[3073]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2990 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:20.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163346432373333353934616466346136636231633566366438653761 Mar 17 18:53:20.300000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.300000 audit[3073]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2990 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:20.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163346432373333353934616466346136636231633566366438653761 Mar 17 18:53:20.300000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.300000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.300000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.300000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.300000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.300000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.300000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.300000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.300000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.300000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.300000 audit: BPF prog-id=110 op=LOAD Mar 17 18:53:20.300000 audit[3073]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2990 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:20.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163346432373333353934616466346136636231633566366438653761 Mar 17 18:53:20.304000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.304000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.304000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.304000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.304000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.304000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.304000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.304000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.304000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.304000 audit: BPF prog-id=111 op=LOAD Mar 17 18:53:20.304000 audit[3073]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2990 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:20.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163346432373333353934616466346136636231633566366438653761 Mar 17 18:53:20.320000 audit: BPF prog-id=111 op=UNLOAD Mar 17 18:53:20.320000 audit: BPF prog-id=110 op=UNLOAD Mar 17 18:53:20.320000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.320000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.320000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.320000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.320000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.320000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.320000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.320000 audit[3073]: AVC avc: denied { perfmon } for pid=3073 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.320000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.320000 audit[3073]: AVC avc: denied { bpf } for pid=3073 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:20.320000 audit: BPF prog-id=112 op=LOAD Mar 17 18:53:20.320000 audit[3073]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2990 pid=3073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:20.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163346432373333353934616466346136636231633566366438653761 Mar 17 18:53:20.486960 env[1471]: time="2025-03-17T18:53:20.486909794Z" level=info msg="StartContainer for \"ac4d2733594adf4a6cb1c5f6d8e7afb4c8228676411f6b4ec787aa52dc125574\" returns successfully" Mar 17 18:53:21.135213 kubelet[1993]: E0317 18:53:21.135160 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:21.312926 kubelet[1993]: I0317 18:53:21.312858 1993 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nginx-deployment-8587fbcb89-dvl86" podStartSLOduration=15.729155824 podStartE2EDuration="20.312842446s" podCreationTimestamp="2025-03-17 18:53:01 +0000 UTC" firstStartedPulling="2025-03-17 18:53:15.625284249 +0000 UTC m=+29.948297174" lastFinishedPulling="2025-03-17 18:53:20.208970871 +0000 UTC m=+34.531983796" observedRunningTime="2025-03-17 18:53:21.312348742 +0000 UTC m=+35.635361667" watchObservedRunningTime="2025-03-17 18:53:21.312842446 +0000 UTC m=+35.635855331" Mar 17 18:53:21.731710 env[1471]: time="2025-03-17T18:53:21.731661227Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:53:21.740460 env[1471]: time="2025-03-17T18:53:21.740417421Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:53:21.747703 env[1471]: time="2025-03-17T18:53:21.747659339Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:53:21.752478 env[1471]: time="2025-03-17T18:53:21.752429176Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:53:21.753031 env[1471]: time="2025-03-17T18:53:21.753002324Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349\"" Mar 17 18:53:21.755569 env[1471]: time="2025-03-17T18:53:21.755532769Z" level=info msg="CreateContainer within sandbox \"c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Mar 17 18:53:21.785027 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3166350202.mount: Deactivated successfully. Mar 17 18:53:21.801086 env[1471]: time="2025-03-17T18:53:21.801036383Z" level=info msg="CreateContainer within sandbox \"c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"8d1b34314ab71c220013ad92a158477b5f51317e8825cb8dc2ce8725c071496a\"" Mar 17 18:53:21.801767 env[1471]: time="2025-03-17T18:53:21.801732297Z" level=info msg="StartContainer for \"8d1b34314ab71c220013ad92a158477b5f51317e8825cb8dc2ce8725c071496a\"" Mar 17 18:53:21.824311 systemd[1]: Started cri-containerd-8d1b34314ab71c220013ad92a158477b5f51317e8825cb8dc2ce8725c071496a.scope. Mar 17 18:53:21.838000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:21.838000 audit[3153]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2884 pid=3153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:21.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864316233343331346162373163323230303133616439326131353834 Mar 17 18:53:21.838000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:21.838000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:21.838000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:21.838000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:21.838000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:21.838000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:21.838000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:21.838000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:21.838000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:21.838000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:21.838000 audit: BPF prog-id=113 op=LOAD Mar 17 18:53:21.838000 audit[3153]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2884 pid=3153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:21.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864316233343331346162373163323230303133616439326131353834 Mar 17 18:53:21.838000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:21.838000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:21.838000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:21.838000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:21.838000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:21.838000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:21.838000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:21.838000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:21.838000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:21.838000 audit: BPF prog-id=114 op=LOAD Mar 17 18:53:21.838000 audit[3153]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2884 pid=3153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:21.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864316233343331346162373163323230303133616439326131353834 Mar 17 18:53:21.838000 audit: BPF prog-id=114 op=UNLOAD Mar 17 18:53:21.838000 audit: BPF prog-id=113 op=UNLOAD Mar 17 18:53:21.838000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:21.838000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:21.838000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:21.838000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:21.838000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:21.838000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:21.838000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:21.838000 audit[3153]: AVC avc: denied { perfmon } for pid=3153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:21.838000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:21.838000 audit[3153]: AVC avc: denied { bpf } for pid=3153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:21.838000 audit: BPF prog-id=115 op=LOAD Mar 17 18:53:21.838000 audit[3153]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2884 pid=3153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:21.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864316233343331346162373163323230303133616439326131353834 Mar 17 18:53:21.860353 env[1471]: time="2025-03-17T18:53:21.860300438Z" level=info msg="StartContainer for \"8d1b34314ab71c220013ad92a158477b5f51317e8825cb8dc2ce8725c071496a\" returns successfully" Mar 17 18:53:22.135613 kubelet[1993]: E0317 18:53:22.135489 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:22.233419 kubelet[1993]: I0317 18:53:22.233344 1993 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Mar 17 18:53:22.233419 kubelet[1993]: I0317 18:53:22.233375 1993 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Mar 17 18:53:22.245175 systemd[1]: run-containerd-runc-k8s.io-8d1b34314ab71c220013ad92a158477b5f51317e8825cb8dc2ce8725c071496a-runc.XyEGcJ.mount: Deactivated successfully. Mar 17 18:53:23.136179 kubelet[1993]: E0317 18:53:23.136138 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:24.137543 kubelet[1993]: E0317 18:53:24.137509 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:25.138145 kubelet[1993]: E0317 18:53:25.138104 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:26.138949 kubelet[1993]: E0317 18:53:26.138915 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:27.108583 kubelet[1993]: E0317 18:53:27.108543 1993 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:27.140035 kubelet[1993]: E0317 18:53:27.140001 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:28.140419 kubelet[1993]: E0317 18:53:28.140376 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:29.141013 kubelet[1993]: E0317 18:53:29.140964 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:30.141526 kubelet[1993]: E0317 18:53:30.141489 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:30.561861 kubelet[1993]: I0317 18:53:30.561807 1993 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-tj7xp" podStartSLOduration=36.560899547 podStartE2EDuration="43.561789958s" podCreationTimestamp="2025-03-17 18:52:47 +0000 UTC" firstStartedPulling="2025-03-17 18:53:14.753244729 +0000 UTC m=+29.076257654" lastFinishedPulling="2025-03-17 18:53:21.75413514 +0000 UTC m=+36.077148065" observedRunningTime="2025-03-17 18:53:22.323794032 +0000 UTC m=+36.646806957" watchObservedRunningTime="2025-03-17 18:53:30.561789958 +0000 UTC m=+44.884802883" Mar 17 18:53:30.566474 systemd[1]: Created slice kubepods-besteffort-pod5a5d9193_374b_4347_8104_7aa0ed8e8b78.slice. Mar 17 18:53:30.573000 audit[3194]: NETFILTER_CFG table=filter:74 family=2 entries=20 op=nft_register_rule pid=3194 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:53:30.579577 kernel: kauditd_printk_skb: 90 callbacks suppressed Mar 17 18:53:30.579641 kernel: audit: type=1325 audit(1742237610.573:714): table=filter:74 family=2 entries=20 op=nft_register_rule pid=3194 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:53:30.573000 audit[3194]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffc0a6c5d0 a2=0 a3=1 items=0 ppid=2202 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:30.616877 kubelet[1993]: I0317 18:53:30.616842 1993 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/5a5d9193-374b-4347-8104-7aa0ed8e8b78-data\") pod \"nfs-server-provisioner-0\" (UID: \"5a5d9193-374b-4347-8104-7aa0ed8e8b78\") " pod="default/nfs-server-provisioner-0" Mar 17 18:53:30.617082 kubelet[1993]: I0317 18:53:30.617065 1993 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v4pk4\" (UniqueName: \"kubernetes.io/projected/5a5d9193-374b-4347-8104-7aa0ed8e8b78-kube-api-access-v4pk4\") pod \"nfs-server-provisioner-0\" (UID: \"5a5d9193-374b-4347-8104-7aa0ed8e8b78\") " pod="default/nfs-server-provisioner-0" Mar 17 18:53:30.618595 kernel: audit: type=1300 audit(1742237610.573:714): arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffc0a6c5d0 a2=0 a3=1 items=0 ppid=2202 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:30.618701 kernel: audit: type=1327 audit(1742237610.573:714): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:53:30.573000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:53:30.592000 audit[3194]: NETFILTER_CFG table=nat:75 family=2 entries=22 op=nft_register_rule pid=3194 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:53:30.644535 kernel: audit: type=1325 audit(1742237610.592:715): table=nat:75 family=2 entries=22 op=nft_register_rule pid=3194 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:53:30.644667 kernel: audit: type=1300 audit(1742237610.592:715): arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffc0a6c5d0 a2=0 a3=1 items=0 ppid=2202 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:30.592000 audit[3194]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffc0a6c5d0 a2=0 a3=1 items=0 ppid=2202 pid=3194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:30.592000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:53:30.683388 kernel: audit: type=1327 audit(1742237610.592:715): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:53:30.684000 audit[3198]: NETFILTER_CFG table=filter:76 family=2 entries=32 op=nft_register_rule pid=3198 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:53:30.684000 audit[3198]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffd7adb550 a2=0 a3=1 items=0 ppid=2202 pid=3198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:30.724329 kernel: audit: type=1325 audit(1742237610.684:716): table=filter:76 family=2 entries=32 op=nft_register_rule pid=3198 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:53:30.724438 kernel: audit: type=1300 audit(1742237610.684:716): arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=ffffd7adb550 a2=0 a3=1 items=0 ppid=2202 pid=3198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:30.724507 kernel: audit: type=1327 audit(1742237610.684:716): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:53:30.684000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:53:30.739000 audit[3198]: NETFILTER_CFG table=nat:77 family=2 entries=22 op=nft_register_rule pid=3198 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:53:30.753092 kernel: audit: type=1325 audit(1742237610.739:717): table=nat:77 family=2 entries=22 op=nft_register_rule pid=3198 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:53:30.739000 audit[3198]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffd7adb550 a2=0 a3=1 items=0 ppid=2202 pid=3198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:30.739000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:53:30.869695 env[1471]: time="2025-03-17T18:53:30.869580679Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:5a5d9193-374b-4347-8104-7aa0ed8e8b78,Namespace:default,Attempt:0,}" Mar 17 18:53:31.050670 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 18:53:31.050772 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Mar 17 18:53:31.036845 systemd-networkd[1622]: cali60e51b789ff: Link UP Mar 17 18:53:31.053656 systemd-networkd[1622]: cali60e51b789ff: Gained carrier Mar 17 18:53:31.071468 env[1471]: 2025-03-17 18:53:30.959 [INFO][3201] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.21-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 5a5d9193-374b-4347-8104-7aa0ed8e8b78 1341 0 2025-03-17 18:53:30 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.20.21 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="9c27852f6e755a0c5508d8bb529a41ede5a344fd8eebb3294233e0f0e53387d2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.21-k8s-nfs--server--provisioner--0-" Mar 17 18:53:31.071468 env[1471]: 2025-03-17 18:53:30.959 [INFO][3201] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="9c27852f6e755a0c5508d8bb529a41ede5a344fd8eebb3294233e0f0e53387d2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.21-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:53:31.071468 env[1471]: 2025-03-17 18:53:30.987 [INFO][3211] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9c27852f6e755a0c5508d8bb529a41ede5a344fd8eebb3294233e0f0e53387d2" HandleID="k8s-pod-network.9c27852f6e755a0c5508d8bb529a41ede5a344fd8eebb3294233e0f0e53387d2" Workload="10.200.20.21-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:53:31.071468 env[1471]: 2025-03-17 18:53:31.000 [INFO][3211] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9c27852f6e755a0c5508d8bb529a41ede5a344fd8eebb3294233e0f0e53387d2" HandleID="k8s-pod-network.9c27852f6e755a0c5508d8bb529a41ede5a344fd8eebb3294233e0f0e53387d2" Workload="10.200.20.21-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002eacb0), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.21", "pod":"nfs-server-provisioner-0", "timestamp":"2025-03-17 18:53:30.987063739 +0000 UTC"}, Hostname:"10.200.20.21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:53:31.071468 env[1471]: 2025-03-17 18:53:31.000 [INFO][3211] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:53:31.071468 env[1471]: 2025-03-17 18:53:31.000 [INFO][3211] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:53:31.071468 env[1471]: 2025-03-17 18:53:31.000 [INFO][3211] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.21' Mar 17 18:53:31.071468 env[1471]: 2025-03-17 18:53:31.003 [INFO][3211] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9c27852f6e755a0c5508d8bb529a41ede5a344fd8eebb3294233e0f0e53387d2" host="10.200.20.21" Mar 17 18:53:31.071468 env[1471]: 2025-03-17 18:53:31.007 [INFO][3211] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.20.21" Mar 17 18:53:31.071468 env[1471]: 2025-03-17 18:53:31.012 [INFO][3211] ipam/ipam.go 489: Trying affinity for 192.168.45.64/26 host="10.200.20.21" Mar 17 18:53:31.071468 env[1471]: 2025-03-17 18:53:31.014 [INFO][3211] ipam/ipam.go 155: Attempting to load block cidr=192.168.45.64/26 host="10.200.20.21" Mar 17 18:53:31.071468 env[1471]: 2025-03-17 18:53:31.017 [INFO][3211] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.45.64/26 host="10.200.20.21" Mar 17 18:53:31.071468 env[1471]: 2025-03-17 18:53:31.017 [INFO][3211] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.45.64/26 handle="k8s-pod-network.9c27852f6e755a0c5508d8bb529a41ede5a344fd8eebb3294233e0f0e53387d2" host="10.200.20.21" Mar 17 18:53:31.071468 env[1471]: 2025-03-17 18:53:31.019 [INFO][3211] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.9c27852f6e755a0c5508d8bb529a41ede5a344fd8eebb3294233e0f0e53387d2 Mar 17 18:53:31.071468 env[1471]: 2025-03-17 18:53:31.026 [INFO][3211] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.45.64/26 handle="k8s-pod-network.9c27852f6e755a0c5508d8bb529a41ede5a344fd8eebb3294233e0f0e53387d2" host="10.200.20.21" Mar 17 18:53:31.071468 env[1471]: 2025-03-17 18:53:31.032 [INFO][3211] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.45.67/26] block=192.168.45.64/26 handle="k8s-pod-network.9c27852f6e755a0c5508d8bb529a41ede5a344fd8eebb3294233e0f0e53387d2" host="10.200.20.21" Mar 17 18:53:31.071468 env[1471]: 2025-03-17 18:53:31.032 [INFO][3211] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.45.67/26] handle="k8s-pod-network.9c27852f6e755a0c5508d8bb529a41ede5a344fd8eebb3294233e0f0e53387d2" host="10.200.20.21" Mar 17 18:53:31.071468 env[1471]: 2025-03-17 18:53:31.032 [INFO][3211] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:53:31.071468 env[1471]: 2025-03-17 18:53:31.032 [INFO][3211] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.45.67/26] IPv6=[] ContainerID="9c27852f6e755a0c5508d8bb529a41ede5a344fd8eebb3294233e0f0e53387d2" HandleID="k8s-pod-network.9c27852f6e755a0c5508d8bb529a41ede5a344fd8eebb3294233e0f0e53387d2" Workload="10.200.20.21-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:53:31.073895 env[1471]: 2025-03-17 18:53:31.034 [INFO][3201] cni-plugin/k8s.go 386: Populated endpoint ContainerID="9c27852f6e755a0c5508d8bb529a41ede5a344fd8eebb3294233e0f0e53387d2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.21-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.21-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"5a5d9193-374b-4347-8104-7aa0ed8e8b78", ResourceVersion:"1341", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 53, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.21", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.45.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:53:31.073895 env[1471]: 2025-03-17 18:53:31.034 [INFO][3201] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.45.67/32] ContainerID="9c27852f6e755a0c5508d8bb529a41ede5a344fd8eebb3294233e0f0e53387d2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.21-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:53:31.073895 env[1471]: 2025-03-17 18:53:31.034 [INFO][3201] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60e51b789ff ContainerID="9c27852f6e755a0c5508d8bb529a41ede5a344fd8eebb3294233e0f0e53387d2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.21-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:53:31.073895 env[1471]: 2025-03-17 18:53:31.054 [INFO][3201] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9c27852f6e755a0c5508d8bb529a41ede5a344fd8eebb3294233e0f0e53387d2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.21-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:53:31.074041 env[1471]: 2025-03-17 18:53:31.054 [INFO][3201] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="9c27852f6e755a0c5508d8bb529a41ede5a344fd8eebb3294233e0f0e53387d2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.21-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.21-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"5a5d9193-374b-4347-8104-7aa0ed8e8b78", ResourceVersion:"1341", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 53, 30, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.21", ContainerID:"9c27852f6e755a0c5508d8bb529a41ede5a344fd8eebb3294233e0f0e53387d2", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.45.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"1a:d5:e3:98:4c:5b", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:53:31.074041 env[1471]: 2025-03-17 18:53:31.069 [INFO][3201] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="9c27852f6e755a0c5508d8bb529a41ede5a344fd8eebb3294233e0f0e53387d2" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.21-k8s-nfs--server--provisioner--0-eth0" Mar 17 18:53:31.087000 audit[3232]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=3232 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:53:31.087000 audit[3232]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19820 a0=3 a1=fffffdfb0d60 a2=0 a3=ffff8eb5afa8 items=0 ppid=2644 pid=3232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:31.087000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:53:31.096650 env[1471]: time="2025-03-17T18:53:31.096577473Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:53:31.096650 env[1471]: time="2025-03-17T18:53:31.096616915Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:53:31.096650 env[1471]: time="2025-03-17T18:53:31.096627035Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:53:31.096977 env[1471]: time="2025-03-17T18:53:31.096944368Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9c27852f6e755a0c5508d8bb529a41ede5a344fd8eebb3294233e0f0e53387d2 pid=3241 runtime=io.containerd.runc.v2 Mar 17 18:53:31.111879 systemd[1]: Started cri-containerd-9c27852f6e755a0c5508d8bb529a41ede5a344fd8eebb3294233e0f0e53387d2.scope. Mar 17 18:53:31.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.128000 audit: BPF prog-id=116 op=LOAD Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit[3251]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=3241 pid=3251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:31.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963323738353266366537353561306335353038643862623532396134 Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit[3251]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=3241 pid=3251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:31.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963323738353266366537353561306335353038643862623532396134 Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit: BPF prog-id=117 op=LOAD Mar 17 18:53:31.129000 audit[3251]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=3241 pid=3251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:31.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963323738353266366537353561306335353038643862623532396134 Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit: BPF prog-id=118 op=LOAD Mar 17 18:53:31.129000 audit[3251]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=3241 pid=3251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:31.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963323738353266366537353561306335353038643862623532396134 Mar 17 18:53:31.129000 audit: BPF prog-id=118 op=UNLOAD Mar 17 18:53:31.129000 audit: BPF prog-id=117 op=UNLOAD Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { perfmon } for pid=3251 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit[3251]: AVC avc: denied { bpf } for pid=3251 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:31.129000 audit: BPF prog-id=119 op=LOAD Mar 17 18:53:31.129000 audit[3251]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=3241 pid=3251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:31.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963323738353266366537353561306335353038643862623532396134 Mar 17 18:53:31.142087 kubelet[1993]: E0317 18:53:31.142038 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:31.147373 env[1471]: time="2025-03-17T18:53:31.147330535Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:5a5d9193-374b-4347-8104-7aa0ed8e8b78,Namespace:default,Attempt:0,} returns sandbox id \"9c27852f6e755a0c5508d8bb529a41ede5a344fd8eebb3294233e0f0e53387d2\"" Mar 17 18:53:31.149198 env[1471]: time="2025-03-17T18:53:31.149157288Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Mar 17 18:53:32.143069 kubelet[1993]: E0317 18:53:32.143028 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:32.804615 systemd-networkd[1622]: cali60e51b789ff: Gained IPv6LL Mar 17 18:53:33.143336 kubelet[1993]: E0317 18:53:33.143121 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:33.413877 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2561728704.mount: Deactivated successfully. Mar 17 18:53:34.144200 kubelet[1993]: E0317 18:53:34.144148 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:35.144901 kubelet[1993]: E0317 18:53:35.144863 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:35.594122 env[1471]: time="2025-03-17T18:53:35.594076488Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:53:35.611902 env[1471]: time="2025-03-17T18:53:35.611864581Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:53:35.617603 env[1471]: time="2025-03-17T18:53:35.617568951Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:53:35.621897 env[1471]: time="2025-03-17T18:53:35.621851348Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:53:35.622714 env[1471]: time="2025-03-17T18:53:35.622655618Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Mar 17 18:53:35.625640 env[1471]: time="2025-03-17T18:53:35.625598086Z" level=info msg="CreateContainer within sandbox \"9c27852f6e755a0c5508d8bb529a41ede5a344fd8eebb3294233e0f0e53387d2\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Mar 17 18:53:35.662812 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2888671277.mount: Deactivated successfully. Mar 17 18:53:35.669105 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2794966217.mount: Deactivated successfully. Mar 17 18:53:35.685027 env[1471]: time="2025-03-17T18:53:35.684978509Z" level=info msg="CreateContainer within sandbox \"9c27852f6e755a0c5508d8bb529a41ede5a344fd8eebb3294233e0f0e53387d2\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"e9cb5aa3c84545a80b2747e8304b0047670e5d7d979777904087b7a4180c29a7\"" Mar 17 18:53:35.686005 env[1471]: time="2025-03-17T18:53:35.685971145Z" level=info msg="StartContainer for \"e9cb5aa3c84545a80b2747e8304b0047670e5d7d979777904087b7a4180c29a7\"" Mar 17 18:53:35.704365 systemd[1]: Started cri-containerd-e9cb5aa3c84545a80b2747e8304b0047670e5d7d979777904087b7a4180c29a7.scope. Mar 17 18:53:35.723508 kernel: kauditd_printk_skb: 62 callbacks suppressed Mar 17 18:53:35.723628 kernel: audit: type=1400 audit(1742237615.716:737): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.758857 kernel: audit: type=1400 audit(1742237615.716:738): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.758967 kernel: audit: type=1400 audit(1742237615.716:739): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.793046 kernel: audit: type=1400 audit(1742237615.716:740): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.809827 kernel: audit: type=1400 audit(1742237615.716:741): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.827083 kernel: audit: type=1400 audit(1742237615.716:742): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.844292 kernel: audit: type=1400 audit(1742237615.716:743): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.861934 kernel: audit: type=1400 audit(1742237615.716:744): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.878980 kernel: audit: type=1400 audit(1742237615.716:745): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.890108 env[1471]: time="2025-03-17T18:53:35.890065287Z" level=info msg="StartContainer for \"e9cb5aa3c84545a80b2747e8304b0047670e5d7d979777904087b7a4180c29a7\" returns successfully" Mar 17 18:53:35.895919 kernel: audit: type=1400 audit(1742237615.721:746): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.721000 audit: BPF prog-id=120 op=LOAD Mar 17 18:53:35.740000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.740000 audit[3282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3241 pid=3282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:35.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539636235616133633834353435613830623237343765383330346230 Mar 17 18:53:35.740000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.740000 audit[3282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3241 pid=3282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:35.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539636235616133633834353435613830623237343765383330346230 Mar 17 18:53:35.740000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.740000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.740000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.740000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.740000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.740000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.740000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.740000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.740000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.740000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.740000 audit: BPF prog-id=121 op=LOAD Mar 17 18:53:35.740000 audit[3282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3241 pid=3282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:35.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539636235616133633834353435613830623237343765383330346230 Mar 17 18:53:35.757000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.757000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.757000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.757000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.757000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.757000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.757000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.757000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.757000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.757000 audit: BPF prog-id=122 op=LOAD Mar 17 18:53:35.757000 audit[3282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3241 pid=3282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:35.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539636235616133633834353435613830623237343765383330346230 Mar 17 18:53:35.774000 audit: BPF prog-id=122 op=UNLOAD Mar 17 18:53:35.774000 audit: BPF prog-id=121 op=UNLOAD Mar 17 18:53:35.774000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.774000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.774000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.774000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.774000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.774000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.774000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.774000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.774000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.774000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:53:35.774000 audit: BPF prog-id=123 op=LOAD Mar 17 18:53:35.774000 audit[3282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3241 pid=3282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:35.774000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539636235616133633834353435613830623237343765383330346230 Mar 17 18:53:35.944000 audit[3309]: AVC avc: denied { search } for pid=3309 comm="rpcbind" name="crypto" dev="proc" ino=20442 scontext=system_u:system_r:svirt_lxc_net_t:s0:c765,c911 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Mar 17 18:53:35.944000 audit[3309]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffa183f000 a2=0 a3=0 items=0 ppid=3293 pid=3309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c765,c911 key=(null) Mar 17 18:53:35.944000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Mar 17 18:53:35.982000 audit[3314]: AVC avc: denied { search } for pid=3314 comm="dbus-daemon" name="crypto" dev="proc" ino=20442 scontext=system_u:system_r:svirt_lxc_net_t:s0:c765,c911 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Mar 17 18:53:35.982000 audit[3314]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffbe42f000 a2=0 a3=0 items=0 ppid=3293 pid=3314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c765,c911 key=(null) Mar 17 18:53:35.982000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Mar 17 18:53:35.986000 audit[3315]: AVC avc: denied { watch } for pid=3315 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538697 scontext=system_u:system_r:svirt_lxc_net_t:s0:c765,c911 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c765,c911 tclass=dir permissive=0 Mar 17 18:53:35.986000 audit[3315]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaaf9d44010 a2=2c8 a3=aaaaf9d19a60 items=0 ppid=3293 pid=3315 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c765,c911 key=(null) Mar 17 18:53:35.986000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Mar 17 18:53:35.990000 audit[3316]: AVC avc: denied { read } for pid=3316 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=20467 scontext=system_u:system_r:svirt_lxc_net_t:s0:c765,c911 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Mar 17 18:53:35.990000 audit[3316]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffb3a7a570 a2=80000 a3=0 items=0 ppid=3293 pid=3316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c765,c911 key=(null) Mar 17 18:53:35.990000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Mar 17 18:53:35.990000 audit[3316]: AVC avc: denied { search } for pid=3316 comm="ganesha.nfsd" name="crypto" dev="proc" ino=20442 scontext=system_u:system_r:svirt_lxc_net_t:s0:c765,c911 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Mar 17 18:53:35.990000 audit[3316]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffb2e0f000 a2=0 a3=0 items=0 ppid=3293 pid=3316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c765,c911 key=(null) Mar 17 18:53:35.990000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Mar 17 18:53:36.145871 kubelet[1993]: E0317 18:53:36.145752 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:36.341686 kubelet[1993]: I0317 18:53:36.341630 1993 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.866032954 podStartE2EDuration="6.341605881s" podCreationTimestamp="2025-03-17 18:53:30 +0000 UTC" firstStartedPulling="2025-03-17 18:53:31.148617667 +0000 UTC m=+45.471630592" lastFinishedPulling="2025-03-17 18:53:35.624190594 +0000 UTC m=+49.947203519" observedRunningTime="2025-03-17 18:53:36.340656767 +0000 UTC m=+50.663669692" watchObservedRunningTime="2025-03-17 18:53:36.341605881 +0000 UTC m=+50.664618766" Mar 17 18:53:36.354000 audit[3323]: NETFILTER_CFG table=filter:79 family=2 entries=20 op=nft_register_rule pid=3323 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:53:36.354000 audit[3323]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffff1b32630 a2=0 a3=1 items=0 ppid=2202 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:36.354000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:53:36.360000 audit[3323]: NETFILTER_CFG table=nat:80 family=2 entries=106 op=nft_register_chain pid=3323 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Mar 17 18:53:36.360000 audit[3323]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=fffff1b32630 a2=0 a3=1 items=0 ppid=2202 pid=3323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:53:36.360000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Mar 17 18:53:37.146874 kubelet[1993]: E0317 18:53:37.146829 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:38.146991 kubelet[1993]: E0317 18:53:38.146958 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:39.147681 kubelet[1993]: E0317 18:53:39.147643 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:40.148287 kubelet[1993]: E0317 18:53:40.148255 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:41.149621 kubelet[1993]: E0317 18:53:41.149581 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:42.150403 kubelet[1993]: E0317 18:53:42.150367 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:43.151546 kubelet[1993]: E0317 18:53:43.151510 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:44.152466 kubelet[1993]: E0317 18:53:44.152422 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:45.153705 kubelet[1993]: E0317 18:53:45.153668 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:46.154027 kubelet[1993]: E0317 18:53:46.153981 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:47.108463 kubelet[1993]: E0317 18:53:47.108401 1993 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:47.127128 env[1471]: time="2025-03-17T18:53:47.127088735Z" level=info msg="StopPodSandbox for \"7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1\"" Mar 17 18:53:47.154106 kubelet[1993]: E0317 18:53:47.154066 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:47.199152 env[1471]: 2025-03-17 18:53:47.164 [WARNING][3356] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.21-k8s-csi--node--driver--tj7xp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e01566be-0dda-44dc-a16f-a31dc9338945", ResourceVersion:"1307", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 52, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.21", ContainerID:"c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c", Pod:"csi-node-driver-tj7xp", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.45.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid20865a8b4e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:53:47.199152 env[1471]: 2025-03-17 18:53:47.164 [INFO][3356] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" Mar 17 18:53:47.199152 env[1471]: 2025-03-17 18:53:47.164 [INFO][3356] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" iface="eth0" netns="" Mar 17 18:53:47.199152 env[1471]: 2025-03-17 18:53:47.164 [INFO][3356] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" Mar 17 18:53:47.199152 env[1471]: 2025-03-17 18:53:47.164 [INFO][3356] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" Mar 17 18:53:47.199152 env[1471]: 2025-03-17 18:53:47.181 [INFO][3362] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" HandleID="k8s-pod-network.7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" Workload="10.200.20.21-k8s-csi--node--driver--tj7xp-eth0" Mar 17 18:53:47.199152 env[1471]: 2025-03-17 18:53:47.181 [INFO][3362] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:53:47.199152 env[1471]: 2025-03-17 18:53:47.181 [INFO][3362] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:53:47.199152 env[1471]: 2025-03-17 18:53:47.194 [WARNING][3362] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" HandleID="k8s-pod-network.7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" Workload="10.200.20.21-k8s-csi--node--driver--tj7xp-eth0" Mar 17 18:53:47.199152 env[1471]: 2025-03-17 18:53:47.194 [INFO][3362] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" HandleID="k8s-pod-network.7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" Workload="10.200.20.21-k8s-csi--node--driver--tj7xp-eth0" Mar 17 18:53:47.199152 env[1471]: 2025-03-17 18:53:47.197 [INFO][3362] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:53:47.199152 env[1471]: 2025-03-17 18:53:47.198 [INFO][3356] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" Mar 17 18:53:47.199791 env[1471]: time="2025-03-17T18:53:47.199747881Z" level=info msg="TearDown network for sandbox \"7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1\" successfully" Mar 17 18:53:47.199862 env[1471]: time="2025-03-17T18:53:47.199843004Z" level=info msg="StopPodSandbox for \"7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1\" returns successfully" Mar 17 18:53:47.200438 env[1471]: time="2025-03-17T18:53:47.200413380Z" level=info msg="RemovePodSandbox for \"7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1\"" Mar 17 18:53:47.200598 env[1471]: time="2025-03-17T18:53:47.200558065Z" level=info msg="Forcibly stopping sandbox \"7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1\"" Mar 17 18:53:47.279560 env[1471]: 2025-03-17 18:53:47.237 [WARNING][3380] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.21-k8s-csi--node--driver--tj7xp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e01566be-0dda-44dc-a16f-a31dc9338945", ResourceVersion:"1307", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 52, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.21", ContainerID:"c2151826759f27ad527ac80da07fc3c25f5e4fab6960ed49cf891302d156ad0c", Pod:"csi-node-driver-tj7xp", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.45.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calid20865a8b4e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:53:47.279560 env[1471]: 2025-03-17 18:53:47.238 [INFO][3380] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" Mar 17 18:53:47.279560 env[1471]: 2025-03-17 18:53:47.238 [INFO][3380] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" iface="eth0" netns="" Mar 17 18:53:47.279560 env[1471]: 2025-03-17 18:53:47.238 [INFO][3380] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" Mar 17 18:53:47.279560 env[1471]: 2025-03-17 18:53:47.238 [INFO][3380] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" Mar 17 18:53:47.279560 env[1471]: 2025-03-17 18:53:47.254 [INFO][3388] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" HandleID="k8s-pod-network.7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" Workload="10.200.20.21-k8s-csi--node--driver--tj7xp-eth0" Mar 17 18:53:47.279560 env[1471]: 2025-03-17 18:53:47.254 [INFO][3388] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:53:47.279560 env[1471]: 2025-03-17 18:53:47.254 [INFO][3388] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:53:47.279560 env[1471]: 2025-03-17 18:53:47.268 [WARNING][3388] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" HandleID="k8s-pod-network.7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" Workload="10.200.20.21-k8s-csi--node--driver--tj7xp-eth0" Mar 17 18:53:47.279560 env[1471]: 2025-03-17 18:53:47.268 [INFO][3388] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" HandleID="k8s-pod-network.7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" Workload="10.200.20.21-k8s-csi--node--driver--tj7xp-eth0" Mar 17 18:53:47.279560 env[1471]: 2025-03-17 18:53:47.271 [INFO][3388] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:53:47.279560 env[1471]: 2025-03-17 18:53:47.278 [INFO][3380] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1" Mar 17 18:53:47.279975 env[1471]: time="2025-03-17T18:53:47.279586518Z" level=info msg="TearDown network for sandbox \"7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1\" successfully" Mar 17 18:53:47.296486 env[1471]: time="2025-03-17T18:53:47.296421776Z" level=info msg="RemovePodSandbox \"7e75fde8824f9628ebe8bec99a28a033b9cabcd4f662fbd052fdec822d7a79f1\" returns successfully" Mar 17 18:53:47.297137 env[1471]: time="2025-03-17T18:53:47.297106396Z" level=info msg="StopPodSandbox for \"e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b\"" Mar 17 18:53:47.372329 env[1471]: 2025-03-17 18:53:47.334 [WARNING][3406] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.21-k8s-nginx--deployment--8587fbcb89--dvl86-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"3d4df255-7ee3-45b0-b570-9820431dd174", ResourceVersion:"1293", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 53, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.21", ContainerID:"3832eed696f2e80d222089fd94581fe26f13f4098d1005bc0c5fe5df4ce285ac", Pod:"nginx-deployment-8587fbcb89-dvl86", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.45.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali7ae62a5b1e0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:53:47.372329 env[1471]: 2025-03-17 18:53:47.335 [INFO][3406] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" Mar 17 18:53:47.372329 env[1471]: 2025-03-17 18:53:47.335 [INFO][3406] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" iface="eth0" netns="" Mar 17 18:53:47.372329 env[1471]: 2025-03-17 18:53:47.335 [INFO][3406] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" Mar 17 18:53:47.372329 env[1471]: 2025-03-17 18:53:47.335 [INFO][3406] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" Mar 17 18:53:47.372329 env[1471]: 2025-03-17 18:53:47.355 [INFO][3412] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" HandleID="k8s-pod-network.e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" Workload="10.200.20.21-k8s-nginx--deployment--8587fbcb89--dvl86-eth0" Mar 17 18:53:47.372329 env[1471]: 2025-03-17 18:53:47.355 [INFO][3412] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:53:47.372329 env[1471]: 2025-03-17 18:53:47.355 [INFO][3412] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:53:47.372329 env[1471]: 2025-03-17 18:53:47.368 [WARNING][3412] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" HandleID="k8s-pod-network.e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" Workload="10.200.20.21-k8s-nginx--deployment--8587fbcb89--dvl86-eth0" Mar 17 18:53:47.372329 env[1471]: 2025-03-17 18:53:47.368 [INFO][3412] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" HandleID="k8s-pod-network.e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" Workload="10.200.20.21-k8s-nginx--deployment--8587fbcb89--dvl86-eth0" Mar 17 18:53:47.372329 env[1471]: 2025-03-17 18:53:47.370 [INFO][3412] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:53:47.372329 env[1471]: 2025-03-17 18:53:47.371 [INFO][3406] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" Mar 17 18:53:47.373483 env[1471]: time="2025-03-17T18:53:47.372296016Z" level=info msg="TearDown network for sandbox \"e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b\" successfully" Mar 17 18:53:47.373523 env[1471]: time="2025-03-17T18:53:47.373484931Z" level=info msg="StopPodSandbox for \"e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b\" returns successfully" Mar 17 18:53:47.373926 env[1471]: time="2025-03-17T18:53:47.373899103Z" level=info msg="RemovePodSandbox for \"e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b\"" Mar 17 18:53:47.373985 env[1471]: time="2025-03-17T18:53:47.373935665Z" level=info msg="Forcibly stopping sandbox \"e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b\"" Mar 17 18:53:47.440328 env[1471]: 2025-03-17 18:53:47.409 [WARNING][3431] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.21-k8s-nginx--deployment--8587fbcb89--dvl86-eth0", GenerateName:"nginx-deployment-8587fbcb89-", Namespace:"default", SelfLink:"", UID:"3d4df255-7ee3-45b0-b570-9820431dd174", ResourceVersion:"1293", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 53, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8587fbcb89", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.21", ContainerID:"3832eed696f2e80d222089fd94581fe26f13f4098d1005bc0c5fe5df4ce285ac", Pod:"nginx-deployment-8587fbcb89-dvl86", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.45.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali7ae62a5b1e0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:53:47.440328 env[1471]: 2025-03-17 18:53:47.409 [INFO][3431] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" Mar 17 18:53:47.440328 env[1471]: 2025-03-17 18:53:47.409 [INFO][3431] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" iface="eth0" netns="" Mar 17 18:53:47.440328 env[1471]: 2025-03-17 18:53:47.409 [INFO][3431] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" Mar 17 18:53:47.440328 env[1471]: 2025-03-17 18:53:47.409 [INFO][3431] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" Mar 17 18:53:47.440328 env[1471]: 2025-03-17 18:53:47.425 [INFO][3437] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" HandleID="k8s-pod-network.e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" Workload="10.200.20.21-k8s-nginx--deployment--8587fbcb89--dvl86-eth0" Mar 17 18:53:47.440328 env[1471]: 2025-03-17 18:53:47.425 [INFO][3437] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:53:47.440328 env[1471]: 2025-03-17 18:53:47.425 [INFO][3437] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:53:47.440328 env[1471]: 2025-03-17 18:53:47.436 [WARNING][3437] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" HandleID="k8s-pod-network.e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" Workload="10.200.20.21-k8s-nginx--deployment--8587fbcb89--dvl86-eth0" Mar 17 18:53:47.440328 env[1471]: 2025-03-17 18:53:47.436 [INFO][3437] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" HandleID="k8s-pod-network.e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" Workload="10.200.20.21-k8s-nginx--deployment--8587fbcb89--dvl86-eth0" Mar 17 18:53:47.440328 env[1471]: 2025-03-17 18:53:47.438 [INFO][3437] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:53:47.440328 env[1471]: 2025-03-17 18:53:47.439 [INFO][3431] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b" Mar 17 18:53:47.440760 env[1471]: time="2025-03-17T18:53:47.440367386Z" level=info msg="TearDown network for sandbox \"e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b\" successfully" Mar 17 18:53:47.450634 env[1471]: time="2025-03-17T18:53:47.450591648Z" level=info msg="RemovePodSandbox \"e4b0c9e9376c37836475dfc03541242e6f9f3d17cc6b65e97f98cbadbe63c36b\" returns successfully" Mar 17 18:53:48.154831 kubelet[1993]: E0317 18:53:48.154799 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:49.155392 kubelet[1993]: E0317 18:53:49.155361 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:50.156285 kubelet[1993]: E0317 18:53:50.156248 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:50.421910 systemd[1]: run-containerd-runc-k8s.io-cd1366ce03923385ef2c59b2981234051605292ebb33e142ebe2c742be1e908e-runc.9VPeGV.mount: Deactivated successfully. Mar 17 18:53:51.157105 kubelet[1993]: E0317 18:53:51.157060 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:52.157848 kubelet[1993]: E0317 18:53:52.157808 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:53.158821 kubelet[1993]: E0317 18:53:53.158784 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:54.159700 kubelet[1993]: E0317 18:53:54.159661 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:54.532418 waagent[1672]: 2025-03-17T18:53:54.532330Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 2] Mar 17 18:53:54.541389 waagent[1672]: 2025-03-17T18:53:54.541324Z INFO ExtHandler Mar 17 18:53:54.541604 waagent[1672]: 2025-03-17T18:53:54.541553Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 6504a436-417c-4b59-a8a3-1557408cf8b8 eTag: 1895095418333063746 source: Fabric] Mar 17 18:53:54.542400 waagent[1672]: 2025-03-17T18:53:54.542340Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Mar 17 18:53:54.543699 waagent[1672]: 2025-03-17T18:53:54.543635Z INFO ExtHandler Mar 17 18:53:54.543835 waagent[1672]: 2025-03-17T18:53:54.543787Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 2] Mar 17 18:53:54.620938 waagent[1672]: 2025-03-17T18:53:54.620877Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Mar 17 18:53:54.784007 waagent[1672]: 2025-03-17T18:53:54.783480Z INFO ExtHandler Downloaded certificate {'thumbprint': '4D703A5481A7B9F739A5AFAED984794E394CF4FE', 'hasPrivateKey': False} Mar 17 18:53:54.784863 waagent[1672]: 2025-03-17T18:53:54.784798Z INFO ExtHandler Downloaded certificate {'thumbprint': '1F830CE72CF1D4E049AB7B7DEE544D9EB0757E59', 'hasPrivateKey': True} Mar 17 18:53:54.785981 waagent[1672]: 2025-03-17T18:53:54.785920Z INFO ExtHandler Fetch goal state completed Mar 17 18:53:54.786999 waagent[1672]: 2025-03-17T18:53:54.786938Z INFO ExtHandler ExtHandler VM enabled for RSM updates, switching to RSM update mode Mar 17 18:53:54.788351 waagent[1672]: 2025-03-17T18:53:54.788294Z INFO ExtHandler ExtHandler Mar 17 18:53:54.788510 waagent[1672]: 2025-03-17T18:53:54.788442Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_2 channel: WireServer source: Fabric activity: c28c4090-9924-4998-99db-586ab40b44d9 correlation 4e5c7bca-63b5-4c27-a072-3bd187617a49 created: 2025-03-17T18:53:44.552307Z] Mar 17 18:53:54.789301 waagent[1672]: 2025-03-17T18:53:54.789241Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Mar 17 18:53:54.791287 waagent[1672]: 2025-03-17T18:53:54.791229Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_2 2 ms] Mar 17 18:53:55.160589 kubelet[1993]: E0317 18:53:55.160118 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:56.160568 kubelet[1993]: E0317 18:53:56.160510 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:57.161561 kubelet[1993]: E0317 18:53:57.161529 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:58.162716 kubelet[1993]: E0317 18:53:58.162678 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:53:59.163804 kubelet[1993]: E0317 18:53:59.163767 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:54:00.164462 kubelet[1993]: E0317 18:54:00.164411 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:54:00.563061 systemd[1]: Created slice kubepods-besteffort-pod9d0d085d_c886_4775_94cb_8d7c248b5c3d.slice. Mar 17 18:54:00.591650 kubelet[1993]: I0317 18:54:00.591615 1993 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-c7bcbc84-e4be-434f-8515-26552275b31f\" (UniqueName: \"kubernetes.io/nfs/9d0d085d-c886-4775-94cb-8d7c248b5c3d-pvc-c7bcbc84-e4be-434f-8515-26552275b31f\") pod \"test-pod-1\" (UID: \"9d0d085d-c886-4775-94cb-8d7c248b5c3d\") " pod="default/test-pod-1" Mar 17 18:54:00.591866 kubelet[1993]: I0317 18:54:00.591850 1993 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-prwgc\" (UniqueName: \"kubernetes.io/projected/9d0d085d-c886-4775-94cb-8d7c248b5c3d-kube-api-access-prwgc\") pod \"test-pod-1\" (UID: \"9d0d085d-c886-4775-94cb-8d7c248b5c3d\") " pod="default/test-pod-1" Mar 17 18:54:00.791748 kernel: Failed to create system directory netfs Mar 17 18:54:00.791902 kernel: kauditd_printk_skb: 68 callbacks suppressed Mar 17 18:54:00.791931 kernel: audit: type=1400 audit(1742237640.780:762): avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:00.791964 kernel: Failed to create system directory netfs Mar 17 18:54:00.780000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:00.780000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:00.815665 kernel: audit: type=1400 audit(1742237640.780:762): avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:00.815763 kernel: Failed to create system directory netfs Mar 17 18:54:00.780000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:00.840475 kernel: audit: type=1400 audit(1742237640.780:762): avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:00.840568 kernel: Failed to create system directory netfs Mar 17 18:54:00.780000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:00.862628 kernel: audit: type=1400 audit(1742237640.780:762): avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:00.780000 audit[3487]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae0ace5e0 a1=12c14 a2=aaaac3e6e028 a3=aaaae0abf010 items=0 ppid=51 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:54:00.911791 kernel: audit: type=1300 audit(1742237640.780:762): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae0ace5e0 a1=12c14 a2=aaaac3e6e028 a3=aaaae0abf010 items=0 ppid=51 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:54:00.911919 kernel: audit: type=1327 audit(1742237640.780:762): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Mar 17 18:54:00.780000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Mar 17 18:54:00.891000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:00.952181 kernel: Failed to create system directory fscache Mar 17 18:54:00.952311 kernel: audit: type=1400 audit(1742237640.891:763): avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:00.952340 kernel: Failed to create system directory fscache Mar 17 18:54:00.952360 kernel: audit: type=1400 audit(1742237640.891:763): avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:00.891000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:00.975945 kernel: Failed to create system directory fscache Mar 17 18:54:00.976063 kernel: audit: type=1400 audit(1742237640.891:763): avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:00.891000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:00.999546 kernel: Failed to create system directory fscache Mar 17 18:54:00.999668 kernel: audit: type=1400 audit(1742237640.891:763): avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:00.891000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.023374 kernel: Failed to create system directory fscache Mar 17 18:54:00.891000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.028048 kernel: Failed to create system directory fscache Mar 17 18:54:00.891000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.032635 kernel: Failed to create system directory fscache Mar 17 18:54:00.891000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.037404 kernel: Failed to create system directory fscache Mar 17 18:54:00.891000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.041993 kernel: Failed to create system directory fscache Mar 17 18:54:00.891000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.046861 kernel: Failed to create system directory fscache Mar 17 18:54:00.891000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.051443 kernel: Failed to create system directory fscache Mar 17 18:54:00.891000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.056052 kernel: Failed to create system directory fscache Mar 17 18:54:01.056139 kernel: Failed to create system directory fscache Mar 17 18:54:00.891000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:00.891000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:00.891000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.065142 kernel: Failed to create system directory fscache Mar 17 18:54:01.068438 kernel: FS-Cache: Loaded Mar 17 18:54:00.891000 audit[3487]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae0ce1210 a1=4c344 a2=aaaac3e6e028 a3=aaaae0abf010 items=0 ppid=51 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:54:00.891000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.159004 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.159069 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.159106 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.164815 kubelet[1993]: E0317 18:54:01.164791 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:54:01.168184 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.168251 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.176901 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.176988 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.185168 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.185224 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.193523 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.193583 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.201614 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.206195 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.206251 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.214322 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.214390 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.222142 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.222228 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.230406 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.234712 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.239045 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.239120 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.246719 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.246795 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.254628 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.258936 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.259023 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.266620 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.266694 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.274331 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.274413 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.281790 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.281865 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.289465 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.289542 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.296800 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.296876 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.300480 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.307744 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.311692 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.311753 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.318930 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.319023 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.322558 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.330020 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.330100 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.337435 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.337498 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.344554 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.344598 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.351726 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.351796 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.358776 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.362718 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.366576 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.366634 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.373825 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.373915 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.381028 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.381088 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.388127 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.388166 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.395219 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.395277 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.402728 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.402790 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.409789 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.413991 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.414054 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.421250 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.421309 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.428786 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.428845 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.435995 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.436064 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.443366 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.443428 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.451531 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.451589 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.458937 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.459012 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.466673 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.466734 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.473817 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.477558 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.477594 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.484587 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.484639 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.491841 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.491904 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.499258 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.499314 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.506503 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.506557 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.513662 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.517550 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.517599 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.524775 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.524859 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.531824 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.531896 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.538998 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.539024 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.546213 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.546270 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.553313 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.553371 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.561080 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.561136 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.569319 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.569376 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.578482 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.578543 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.587467 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.587562 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.595839 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.595898 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.604199 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.604272 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.612153 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.612249 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.621575 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.621627 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.628783 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.628877 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.145000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.635910 kernel: Failed to create system directory sunrpc Mar 17 18:54:01.648277 kernel: RPC: Registered named UNIX socket transport module. Mar 17 18:54:01.648348 kernel: RPC: Registered udp transport module. Mar 17 18:54:01.648382 kernel: RPC: Registered tcp transport module. Mar 17 18:54:01.656445 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Mar 17 18:54:01.145000 audit[3487]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae0d2d560 a1=14a6e4 a2=aaaac3e6e028 a3=aaaae0abf010 items=6 ppid=51 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:54:01.145000 audit: CWD cwd="/" Mar 17 18:54:01.145000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:54:01.145000 audit: PATH item=1 name=(null) inode=22809 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:54:01.145000 audit: PATH item=2 name=(null) inode=22809 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:54:01.145000 audit: PATH item=3 name=(null) inode=22810 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:54:01.145000 audit: PATH item=4 name=(null) inode=22809 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:54:01.145000 audit: PATH item=5 name=(null) inode=22811 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Mar 17 18:54:01.145000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.740466 kernel: Failed to create system directory nfs Mar 17 18:54:01.740508 kernel: Failed to create system directory nfs Mar 17 18:54:01.740526 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.747408 kernel: Failed to create system directory nfs Mar 17 18:54:01.747472 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.754251 kernel: Failed to create system directory nfs Mar 17 18:54:01.754307 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.762609 kernel: Failed to create system directory nfs Mar 17 18:54:01.762648 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.770559 kernel: Failed to create system directory nfs Mar 17 18:54:01.770624 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.778903 kernel: Failed to create system directory nfs Mar 17 18:54:01.778968 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.785710 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.789472 kernel: Failed to create system directory nfs Mar 17 18:54:01.789518 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.796598 kernel: Failed to create system directory nfs Mar 17 18:54:01.796663 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.803323 kernel: Failed to create system directory nfs Mar 17 18:54:01.803394 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.811785 kernel: Failed to create system directory nfs Mar 17 18:54:01.811851 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.819693 kernel: Failed to create system directory nfs Mar 17 18:54:01.819747 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.827491 kernel: Failed to create system directory nfs Mar 17 18:54:01.827578 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.834399 kernel: Failed to create system directory nfs Mar 17 18:54:01.834480 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.842372 kernel: Failed to create system directory nfs Mar 17 18:54:01.842431 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.849213 kernel: Failed to create system directory nfs Mar 17 18:54:01.849239 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.857425 kernel: Failed to create system directory nfs Mar 17 18:54:01.857539 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.865441 kernel: Failed to create system directory nfs Mar 17 18:54:01.865527 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.873505 kernel: Failed to create system directory nfs Mar 17 18:54:01.873560 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.880634 kernel: Failed to create system directory nfs Mar 17 18:54:01.880684 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.888050 kernel: Failed to create system directory nfs Mar 17 18:54:01.888106 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.895119 kernel: Failed to create system directory nfs Mar 17 18:54:01.895194 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.898594 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.902093 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.908926 kernel: Failed to create system directory nfs Mar 17 18:54:01.908975 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.915682 kernel: Failed to create system directory nfs Mar 17 18:54:01.915757 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.920262 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.923933 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.931674 kernel: Failed to create system directory nfs Mar 17 18:54:01.931734 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.938793 kernel: Failed to create system directory nfs Mar 17 18:54:01.938848 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.945553 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.949275 kernel: Failed to create system directory nfs Mar 17 18:54:01.949328 kernel: Failed to create system directory nfs Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.729000 audit[3487]: AVC avc: denied { confidentiality } for pid=3487 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:01.956103 kernel: Failed to create system directory nfs Mar 17 18:54:01.976490 kernel: FS-Cache: Netfs 'nfs' registered for caching Mar 17 18:54:01.729000 audit[3487]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae0ed6980 a1=116284 a2=aaaac3e6e028 a3=aaaae0abf010 items=0 ppid=51 pid=3487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:54:01.729000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.100716 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.100813 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.100832 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.107891 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.107944 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.117092 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.117187 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.120611 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.124215 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.131137 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.131192 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.138004 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.138053 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.144991 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.148944 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.148987 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.156311 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.156362 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.164097 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.164151 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.165246 kubelet[1993]: E0317 18:54:02.165189 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.172656 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.172735 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.179767 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.179846 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.186604 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.186666 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.193655 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.193687 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.200903 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.200952 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.207914 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.207982 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.216060 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.216125 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.224442 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.224520 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.230872 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.230943 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.238022 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.238087 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.245116 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.245151 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.252608 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.252641 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.259574 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.259648 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.267602 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.267683 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.275588 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.275656 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.282573 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.282624 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.286077 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.289726 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.293279 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.300338 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.304264 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.304320 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.311143 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.311191 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.315068 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.318545 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.321966 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.325414 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.328973 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.332837 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.336350 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.339797 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.343318 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.346995 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.350693 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.358059 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.358091 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.361646 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.368565 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.368621 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.372043 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.375611 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.382611 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.382669 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.389530 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.389589 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.396597 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.396658 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.403405 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.403477 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.413370 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.413441 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.420303 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.420379 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.427441 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.427488 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.434243 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.434317 kernel: Failed to create system directory nfs4 Mar 17 18:54:02.087000 audit[3494]: AVC avc: denied { confidentiality } for pid=3494 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.552207 kernel: NFS: Registering the id_resolver key type Mar 17 18:54:02.552358 kernel: Key type id_resolver registered Mar 17 18:54:02.552393 kernel: Key type id_legacy registered Mar 17 18:54:02.087000 audit[3494]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff9cf4a010 a1=19c514 a2=aaaab07ae028 a3=aaaac482e010 items=0 ppid=51 pid=3494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:54:02.087000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Mar 17 18:54:02.596000 audit[3495]: AVC avc: denied { confidentiality } for pid=3495 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.596000 audit[3495]: AVC avc: denied { confidentiality } for pid=3495 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.606287 kernel: Failed to create system directory rpcgss Mar 17 18:54:02.606379 kernel: Failed to create system directory rpcgss Mar 17 18:54:02.606423 kernel: Failed to create system directory rpcgss Mar 17 18:54:02.596000 audit[3495]: AVC avc: denied { confidentiality } for pid=3495 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.609875 kernel: Failed to create system directory rpcgss Mar 17 18:54:02.596000 audit[3495]: AVC avc: denied { confidentiality } for pid=3495 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.613618 kernel: Failed to create system directory rpcgss Mar 17 18:54:02.596000 audit[3495]: AVC avc: denied { confidentiality } for pid=3495 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.596000 audit[3495]: AVC avc: denied { confidentiality } for pid=3495 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.621194 kernel: Failed to create system directory rpcgss Mar 17 18:54:02.621247 kernel: Failed to create system directory rpcgss Mar 17 18:54:02.596000 audit[3495]: AVC avc: denied { confidentiality } for pid=3495 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.624810 kernel: Failed to create system directory rpcgss Mar 17 18:54:02.596000 audit[3495]: AVC avc: denied { confidentiality } for pid=3495 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.628864 kernel: Failed to create system directory rpcgss Mar 17 18:54:02.596000 audit[3495]: AVC avc: denied { confidentiality } for pid=3495 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.596000 audit[3495]: AVC avc: denied { confidentiality } for pid=3495 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.636429 kernel: Failed to create system directory rpcgss Mar 17 18:54:02.636492 kernel: Failed to create system directory rpcgss Mar 17 18:54:02.596000 audit[3495]: AVC avc: denied { confidentiality } for pid=3495 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.596000 audit[3495]: AVC avc: denied { confidentiality } for pid=3495 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.644141 kernel: Failed to create system directory rpcgss Mar 17 18:54:02.644178 kernel: Failed to create system directory rpcgss Mar 17 18:54:02.596000 audit[3495]: AVC avc: denied { confidentiality } for pid=3495 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.647965 kernel: Failed to create system directory rpcgss Mar 17 18:54:02.596000 audit[3495]: AVC avc: denied { confidentiality } for pid=3495 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.596000 audit[3495]: AVC avc: denied { confidentiality } for pid=3495 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.655702 kernel: Failed to create system directory rpcgss Mar 17 18:54:02.655758 kernel: Failed to create system directory rpcgss Mar 17 18:54:02.596000 audit[3495]: AVC avc: denied { confidentiality } for pid=3495 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.596000 audit[3495]: AVC avc: denied { confidentiality } for pid=3495 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.663517 kernel: Failed to create system directory rpcgss Mar 17 18:54:02.663570 kernel: Failed to create system directory rpcgss Mar 17 18:54:02.596000 audit[3495]: AVC avc: denied { confidentiality } for pid=3495 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.596000 audit[3495]: AVC avc: denied { confidentiality } for pid=3495 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.670764 kernel: Failed to create system directory rpcgss Mar 17 18:54:02.670794 kernel: Failed to create system directory rpcgss Mar 17 18:54:02.596000 audit[3495]: AVC avc: denied { confidentiality } for pid=3495 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.596000 audit[3495]: AVC avc: denied { confidentiality } for pid=3495 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.678133 kernel: Failed to create system directory rpcgss Mar 17 18:54:02.678184 kernel: Failed to create system directory rpcgss Mar 17 18:54:02.596000 audit[3495]: AVC avc: denied { confidentiality } for pid=3495 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.596000 audit[3495]: AVC avc: denied { confidentiality } for pid=3495 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.685723 kernel: Failed to create system directory rpcgss Mar 17 18:54:02.685773 kernel: Failed to create system directory rpcgss Mar 17 18:54:02.596000 audit[3495]: AVC avc: denied { confidentiality } for pid=3495 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.689529 kernel: Failed to create system directory rpcgss Mar 17 18:54:02.596000 audit[3495]: AVC avc: denied { confidentiality } for pid=3495 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.596000 audit[3495]: AVC avc: denied { confidentiality } for pid=3495 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Mar 17 18:54:02.696724 kernel: Failed to create system directory rpcgss Mar 17 18:54:02.596000 audit[3495]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff8b202010 a1=5ee5c a2=aaaab36ce028 a3=aaaae2394010 items=0 ppid=51 pid=3495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:54:02.596000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Mar 17 18:54:03.024811 nfsidmap[3504]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.7-a-78f2e87fa3' Mar 17 18:54:03.040167 nfsidmap[3505]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.7-a-78f2e87fa3' Mar 17 18:54:03.053000 audit[1578]: AVC avc: denied { watch_reads } for pid=1578 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2776 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:54:03.053000 audit[1578]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaadc4e5a70 a2=10 a3=0 items=0 ppid=1 pid=1578 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:54:03.053000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Mar 17 18:54:03.053000 audit[1578]: AVC avc: denied { watch_reads } for pid=1578 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2776 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:54:03.053000 audit[1578]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaadc4e5a70 a2=10 a3=0 items=0 ppid=1 pid=1578 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:54:03.053000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Mar 17 18:54:03.053000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2776 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:54:03.053000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2776 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:54:03.053000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2776 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Mar 17 18:54:03.165429 kubelet[1993]: E0317 18:54:03.165397 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:54:03.266281 env[1471]: time="2025-03-17T18:54:03.265937154Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:9d0d085d-c886-4775-94cb-8d7c248b5c3d,Namespace:default,Attempt:0,}" Mar 17 18:54:03.442141 systemd-networkd[1622]: cali5ec59c6bf6e: Link UP Mar 17 18:54:03.453418 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Mar 17 18:54:03.453573 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Mar 17 18:54:03.457804 systemd-networkd[1622]: cali5ec59c6bf6e: Gained carrier Mar 17 18:54:03.472916 env[1471]: 2025-03-17 18:54:03.353 [INFO][3506] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.21-k8s-test--pod--1-eth0 default 9d0d085d-c886-4775-94cb-8d7c248b5c3d 1433 0 2025-03-17 18:53:31 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.21 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="0bbfa83a1672f1f200c0ce9fa9df621467460c4a90eac5e86cb3d1539ad662c3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.21-k8s-test--pod--1-" Mar 17 18:54:03.472916 env[1471]: 2025-03-17 18:54:03.353 [INFO][3506] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0bbfa83a1672f1f200c0ce9fa9df621467460c4a90eac5e86cb3d1539ad662c3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.21-k8s-test--pod--1-eth0" Mar 17 18:54:03.472916 env[1471]: 2025-03-17 18:54:03.387 [INFO][3519] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0bbfa83a1672f1f200c0ce9fa9df621467460c4a90eac5e86cb3d1539ad662c3" HandleID="k8s-pod-network.0bbfa83a1672f1f200c0ce9fa9df621467460c4a90eac5e86cb3d1539ad662c3" Workload="10.200.20.21-k8s-test--pod--1-eth0" Mar 17 18:54:03.472916 env[1471]: 2025-03-17 18:54:03.400 [INFO][3519] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0bbfa83a1672f1f200c0ce9fa9df621467460c4a90eac5e86cb3d1539ad662c3" HandleID="k8s-pod-network.0bbfa83a1672f1f200c0ce9fa9df621467460c4a90eac5e86cb3d1539ad662c3" Workload="10.200.20.21-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003174e0), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.21", "pod":"test-pod-1", "timestamp":"2025-03-17 18:54:03.387410588 +0000 UTC"}, Hostname:"10.200.20.21", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Mar 17 18:54:03.472916 env[1471]: 2025-03-17 18:54:03.400 [INFO][3519] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Mar 17 18:54:03.472916 env[1471]: 2025-03-17 18:54:03.400 [INFO][3519] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Mar 17 18:54:03.472916 env[1471]: 2025-03-17 18:54:03.400 [INFO][3519] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.21' Mar 17 18:54:03.472916 env[1471]: 2025-03-17 18:54:03.402 [INFO][3519] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0bbfa83a1672f1f200c0ce9fa9df621467460c4a90eac5e86cb3d1539ad662c3" host="10.200.20.21" Mar 17 18:54:03.472916 env[1471]: 2025-03-17 18:54:03.407 [INFO][3519] ipam/ipam.go 372: Looking up existing affinities for host host="10.200.20.21" Mar 17 18:54:03.472916 env[1471]: 2025-03-17 18:54:03.412 [INFO][3519] ipam/ipam.go 489: Trying affinity for 192.168.45.64/26 host="10.200.20.21" Mar 17 18:54:03.472916 env[1471]: 2025-03-17 18:54:03.414 [INFO][3519] ipam/ipam.go 155: Attempting to load block cidr=192.168.45.64/26 host="10.200.20.21" Mar 17 18:54:03.472916 env[1471]: 2025-03-17 18:54:03.417 [INFO][3519] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.45.64/26 host="10.200.20.21" Mar 17 18:54:03.472916 env[1471]: 2025-03-17 18:54:03.417 [INFO][3519] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.45.64/26 handle="k8s-pod-network.0bbfa83a1672f1f200c0ce9fa9df621467460c4a90eac5e86cb3d1539ad662c3" host="10.200.20.21" Mar 17 18:54:03.472916 env[1471]: 2025-03-17 18:54:03.419 [INFO][3519] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0bbfa83a1672f1f200c0ce9fa9df621467460c4a90eac5e86cb3d1539ad662c3 Mar 17 18:54:03.472916 env[1471]: 2025-03-17 18:54:03.425 [INFO][3519] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.45.64/26 handle="k8s-pod-network.0bbfa83a1672f1f200c0ce9fa9df621467460c4a90eac5e86cb3d1539ad662c3" host="10.200.20.21" Mar 17 18:54:03.472916 env[1471]: 2025-03-17 18:54:03.436 [INFO][3519] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.45.68/26] block=192.168.45.64/26 handle="k8s-pod-network.0bbfa83a1672f1f200c0ce9fa9df621467460c4a90eac5e86cb3d1539ad662c3" host="10.200.20.21" Mar 17 18:54:03.472916 env[1471]: 2025-03-17 18:54:03.436 [INFO][3519] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.45.68/26] handle="k8s-pod-network.0bbfa83a1672f1f200c0ce9fa9df621467460c4a90eac5e86cb3d1539ad662c3" host="10.200.20.21" Mar 17 18:54:03.472916 env[1471]: 2025-03-17 18:54:03.436 [INFO][3519] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Mar 17 18:54:03.472916 env[1471]: 2025-03-17 18:54:03.436 [INFO][3519] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.45.68/26] IPv6=[] ContainerID="0bbfa83a1672f1f200c0ce9fa9df621467460c4a90eac5e86cb3d1539ad662c3" HandleID="k8s-pod-network.0bbfa83a1672f1f200c0ce9fa9df621467460c4a90eac5e86cb3d1539ad662c3" Workload="10.200.20.21-k8s-test--pod--1-eth0" Mar 17 18:54:03.472916 env[1471]: 2025-03-17 18:54:03.438 [INFO][3506] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0bbfa83a1672f1f200c0ce9fa9df621467460c4a90eac5e86cb3d1539ad662c3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.21-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.21-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"9d0d085d-c886-4775-94cb-8d7c248b5c3d", ResourceVersion:"1433", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 53, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.21", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.45.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:54:03.473534 env[1471]: 2025-03-17 18:54:03.438 [INFO][3506] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.45.68/32] ContainerID="0bbfa83a1672f1f200c0ce9fa9df621467460c4a90eac5e86cb3d1539ad662c3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.21-k8s-test--pod--1-eth0" Mar 17 18:54:03.473534 env[1471]: 2025-03-17 18:54:03.438 [INFO][3506] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5ec59c6bf6e ContainerID="0bbfa83a1672f1f200c0ce9fa9df621467460c4a90eac5e86cb3d1539ad662c3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.21-k8s-test--pod--1-eth0" Mar 17 18:54:03.473534 env[1471]: 2025-03-17 18:54:03.459 [INFO][3506] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0bbfa83a1672f1f200c0ce9fa9df621467460c4a90eac5e86cb3d1539ad662c3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.21-k8s-test--pod--1-eth0" Mar 17 18:54:03.473534 env[1471]: 2025-03-17 18:54:03.461 [INFO][3506] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0bbfa83a1672f1f200c0ce9fa9df621467460c4a90eac5e86cb3d1539ad662c3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.21-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.21-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"9d0d085d-c886-4775-94cb-8d7c248b5c3d", ResourceVersion:"1433", Generation:0, CreationTimestamp:time.Date(2025, time.March, 17, 18, 53, 31, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.21", ContainerID:"0bbfa83a1672f1f200c0ce9fa9df621467460c4a90eac5e86cb3d1539ad662c3", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.45.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"d6:8d:e4:da:3a:68", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Mar 17 18:54:03.473534 env[1471]: 2025-03-17 18:54:03.471 [INFO][3506] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0bbfa83a1672f1f200c0ce9fa9df621467460c4a90eac5e86cb3d1539ad662c3" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.21-k8s-test--pod--1-eth0" Mar 17 18:54:03.483000 audit[3538]: NETFILTER_CFG table=filter:81 family=2 entries=38 op=nft_register_chain pid=3538 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Mar 17 18:54:03.483000 audit[3538]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19400 a0=3 a1=fffffacaae10 a2=0 a3=ffff8c0bdfa8 items=0 ppid=2644 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:54:03.483000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Mar 17 18:54:03.502772 env[1471]: time="2025-03-17T18:54:03.502681836Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Mar 17 18:54:03.502925 env[1471]: time="2025-03-17T18:54:03.502778078Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Mar 17 18:54:03.502925 env[1471]: time="2025-03-17T18:54:03.502822039Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Mar 17 18:54:03.507432 env[1471]: time="2025-03-17T18:54:03.503556976Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0bbfa83a1672f1f200c0ce9fa9df621467460c4a90eac5e86cb3d1539ad662c3 pid=3545 runtime=io.containerd.runc.v2 Mar 17 18:54:03.518572 systemd[1]: Started cri-containerd-0bbfa83a1672f1f200c0ce9fa9df621467460c4a90eac5e86cb3d1539ad662c3.scope. Mar 17 18:54:03.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.532000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.532000 audit: BPF prog-id=124 op=LOAD Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { bpf } for pid=3556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit[3556]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3545 pid=3556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:54:03.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062626661383361313637326631663230306330636539666139646636 Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit[3556]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3545 pid=3556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:54:03.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062626661383361313637326631663230306330636539666139646636 Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { bpf } for pid=3556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { bpf } for pid=3556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { bpf } for pid=3556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { bpf } for pid=3556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { bpf } for pid=3556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit: BPF prog-id=125 op=LOAD Mar 17 18:54:03.533000 audit[3556]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3545 pid=3556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:54:03.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062626661383361313637326631663230306330636539666139646636 Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { bpf } for pid=3556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { bpf } for pid=3556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { bpf } for pid=3556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { bpf } for pid=3556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit: BPF prog-id=126 op=LOAD Mar 17 18:54:03.533000 audit[3556]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3545 pid=3556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:54:03.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062626661383361313637326631663230306330636539666139646636 Mar 17 18:54:03.533000 audit: BPF prog-id=126 op=UNLOAD Mar 17 18:54:03.533000 audit: BPF prog-id=125 op=UNLOAD Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { bpf } for pid=3556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { bpf } for pid=3556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { bpf } for pid=3556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { perfmon } for pid=3556 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { bpf } for pid=3556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit[3556]: AVC avc: denied { bpf } for pid=3556 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:03.533000 audit: BPF prog-id=127 op=LOAD Mar 17 18:54:03.533000 audit[3556]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3545 pid=3556 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:54:03.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062626661383361313637326631663230306330636539666139646636 Mar 17 18:54:03.554567 env[1471]: time="2025-03-17T18:54:03.554527045Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:9d0d085d-c886-4775-94cb-8d7c248b5c3d,Namespace:default,Attempt:0,} returns sandbox id \"0bbfa83a1672f1f200c0ce9fa9df621467460c4a90eac5e86cb3d1539ad662c3\"" Mar 17 18:54:03.556100 env[1471]: time="2025-03-17T18:54:03.556078121Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Mar 17 18:54:03.961375 env[1471]: time="2025-03-17T18:54:03.961322053Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:54:03.971858 env[1471]: time="2025-03-17T18:54:03.971815538Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:f660a383148a8217a75a455efeb8bfd4cbe3afa737712cc0e25f27c03b770dd4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:54:03.976070 env[1471]: time="2025-03-17T18:54:03.976027876Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:54:03.980785 env[1471]: time="2025-03-17T18:54:03.980746066Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:b927c62cc716b99bce51774b46a63feb63f5414c6f985fb80cacd1933bbd0e06,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Mar 17 18:54:03.981654 env[1471]: time="2025-03-17T18:54:03.981620566Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:f660a383148a8217a75a455efeb8bfd4cbe3afa737712cc0e25f27c03b770dd4\"" Mar 17 18:54:03.985000 env[1471]: time="2025-03-17T18:54:03.984966244Z" level=info msg="CreateContainer within sandbox \"0bbfa83a1672f1f200c0ce9fa9df621467460c4a90eac5e86cb3d1539ad662c3\" for container &ContainerMetadata{Name:test,Attempt:0,}" Mar 17 18:54:04.020696 env[1471]: time="2025-03-17T18:54:04.020641871Z" level=info msg="CreateContainer within sandbox \"0bbfa83a1672f1f200c0ce9fa9df621467460c4a90eac5e86cb3d1539ad662c3\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"e8f9c4f66f668f07d2e233bbda84aa7a7ef10703bdecfa59a2f5a3292e6cd743\"" Mar 17 18:54:04.021517 env[1471]: time="2025-03-17T18:54:04.021486370Z" level=info msg="StartContainer for \"e8f9c4f66f668f07d2e233bbda84aa7a7ef10703bdecfa59a2f5a3292e6cd743\"" Mar 17 18:54:04.036732 systemd[1]: Started cri-containerd-e8f9c4f66f668f07d2e233bbda84aa7a7ef10703bdecfa59a2f5a3292e6cd743.scope. Mar 17 18:54:04.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.053000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.053000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.054000 audit: BPF prog-id=128 op=LOAD Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit[3587]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3545 pid=3587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:54:04.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538663963346636366636363866303764326532333362626461383461 Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit[3587]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3545 pid=3587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:54:04.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538663963346636366636363866303764326532333362626461383461 Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit: BPF prog-id=129 op=LOAD Mar 17 18:54:04.055000 audit[3587]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3545 pid=3587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:54:04.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538663963346636366636363866303764326532333362626461383461 Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit: BPF prog-id=130 op=LOAD Mar 17 18:54:04.055000 audit[3587]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3545 pid=3587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:54:04.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538663963346636366636363866303764326532333362626461383461 Mar 17 18:54:04.055000 audit: BPF prog-id=130 op=UNLOAD Mar 17 18:54:04.055000 audit: BPF prog-id=129 op=UNLOAD Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { perfmon } for pid=3587 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit[3587]: AVC avc: denied { bpf } for pid=3587 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Mar 17 18:54:04.055000 audit: BPF prog-id=131 op=LOAD Mar 17 18:54:04.055000 audit[3587]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3545 pid=3587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Mar 17 18:54:04.055000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538663963346636366636363866303764326532333362626461383461 Mar 17 18:54:04.074910 env[1471]: time="2025-03-17T18:54:04.074857439Z" level=info msg="StartContainer for \"e8f9c4f66f668f07d2e233bbda84aa7a7ef10703bdecfa59a2f5a3292e6cd743\" returns successfully" Mar 17 18:54:04.166655 kubelet[1993]: E0317 18:54:04.166596 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:54:05.167072 kubelet[1993]: E0317 18:54:05.167039 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:54:05.381933 systemd-networkd[1622]: cali5ec59c6bf6e: Gained IPv6LL Mar 17 18:54:06.167654 kubelet[1993]: E0317 18:54:06.167618 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:54:07.109328 kubelet[1993]: E0317 18:54:07.109298 1993 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:54:07.168099 kubelet[1993]: E0317 18:54:07.168057 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:54:08.169030 kubelet[1993]: E0317 18:54:08.168996 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:54:09.170121 kubelet[1993]: E0317 18:54:09.170084 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:54:10.170387 kubelet[1993]: E0317 18:54:10.170357 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:54:11.171610 kubelet[1993]: E0317 18:54:11.171570 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:54:12.172031 kubelet[1993]: E0317 18:54:12.171998 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Mar 17 18:54:13.173464 kubelet[1993]: E0317 18:54:13.173414 1993 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"